cyber notes


Cambridge Technicals Level 3 ICT
Unit 3 - Cyber Security Revision

Why is Information Security Important?

·       Everyone who works with an information system should understand their responsibility to protect the system against theft or loss and all IT professionals need to understand how to support the organisation in protecting its digital assets and hardware.

·       Organisations collect, create and manipulate a wide range of data and information; the cost of these activities is often much higher than the organisation realises until they are lost or stolen.

Confidentiality, Integrity and Availability of Digital Systems


·       This is roughly equivalent to privacy. There are measured undertaken to prevent sensitive information from reaching the wrong people, while making sure that the right people can in fact get it.

·         In the wrong hands, confidential information can be misused to commit illegal activity (e.g., fraud or discrimination), which can in turn result in costly lawsuits for the employer.

·         Many countries have laws protecting the confidentiality of certain information in the workplace.

·          The disclosure of sensitive employee and management information can lead to a loss of employee trust, confidence and loyalty. This will almost always result in a loss of productivity.


·         This involves the maintaining of consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in transmit or in storage, and steps must be taken to ensure that data cannot be altered by unauthorised people.

·         Data comes from everywhere these days. Just as a few examples, we have mobile devices, loyalty cards, customer relationship management (CRM) systems, social media sites, GPS location data and complex market research tools.

·         The source pool is still growing too; the ongoing development of concepts like the Internet of Things (IoT) mean that machines are also becoming an integral part of the data deluge. Alongside the more traditional computerised devices, businesses will soon be mining information from seemingly inanimate objects (think fridges, tables and cars).

·         Not only will this information be arriving from all directions, it will exist in various formats: everything from numbers and formulas to individual words and pieces of text.

·         Some staff would be relying on their own spreadsheets and word documents while other, more data-competent team members put their faith in advanced data visualisation tools.



·         Availability of information refers to ensuring that authorised parties are able to access the information when needed.

·         Denying access to information has become a very common attack nowadays. Almost every week you can find news about high profile websites being taken down by DDoS attacks.

·         Other factors that could lead to lack of availability to important information may include accidents such as power outages or natural disasters such as floods.

·         Availability is ensured in various ways. Backup is key. Regularly doing off-site backups can limit the damage caused by damage to hard


Timothy Hoadley


Cyber notes are electronic notes that can be accessed and edited by multiple users simultaneously. As with any online activity, there are potential security risks associated with cyber notes. Managed service providers can provide cybersecurity solutions to ensure that users' information and accounts are protected from cyber threats. These providers offer a range of services, such as risk assessments, security monitoring, and incident response, to prevent and mitigate cyber attacks.