Cybersecurity CS Thinking Example 2

Follow the full solution, then compare it with the other examples linked below.

Example 2

medium
Explain three methods of protecting against cyber attacks: encryption, authentication, and firewalls.

Solution

  1. 1
    Step 1: Encryption scrambles data so only authorised parties with the correct key can read it. Even if data is intercepted, it is unreadable without the key.
  2. 2
    Step 2: Authentication verifies user identity before granting access. Methods: passwords, two-factor authentication (2FA), biometrics (fingerprint, face recognition).
  3. 3
    Step 3: Firewalls monitor and filter network traffic, blocking unauthorised connections. They act as a barrier between a trusted internal network and untrusted external networks.

Answer

Encryption (scrambles data), Authentication (verifies identity), Firewalls (filter network traffic). Multiple layers of defence are needed.
Defence in depth โ€” using multiple security measures โ€” is a core cybersecurity principle. No single measure is sufficient; security relies on layers working together.

About Cybersecurity

The practice of protecting computing systems, networks, and data from unauthorized access, attacks, and damage. Cybersecurity encompasses three core goals: confidentiality (only authorized users can access data), integrity (data is not tampered with), and availability (systems remain operational).

Learn more about Cybersecurity โ†’

More Cybersecurity Examples