Cybersecurity is the practice of protecting systems, networks, and data from digital threats. With the rise of IoT devices, Big Data, and networked systems, security must be flexible and adaptive.
One common safeguard is Two-Factor Authentication (2FA), such as TOTP (Time-based One-Time Password) with a 30-second time base, ensuring only the right user gains access.
To achieve comprehensive protection, cybersecurity can be visualized through the Cybersecurity Cube Model (McCumber Cube), which balances security goals, information states, and security safeguards.
Two-Factor Authentication (2FA)
Confidentiality
Ensures only authorized users can access data.
Example: User authentication, encryption, access control.
Integrity
Keeps data accurate, complete, and unaltered unless changed by the rightful owner.
Example: Hashing, digital signatures, checksums. (one way ensuring security)
Availability
Ensures data and systems are accessible whenever needed.
Example: Backups, redundant systems, DDoS protection, 24/7 uptime.
Authentication
Verifies identity of users, systems, or devices.
Examples: MFA, passwords, PINs, biometrics (fingerprint, face ID).
Authorization
Defines permissions, access rights, and privileges.
Example: Role-based access control (RBAC).
Accounting (Auditing)
Tracks and records user activity for monitoring and compliance (validate).
Example: Logs, forensic analysis, intrusion detection.
Purpose: detect misuse, validate actions, provide evidence.
Storage (Data at Rest)
Data stored in databases, disks, or cloud. Needs encryption and access control.
Transmission (Data in Motion)
Data moving across networks. Needs secure channels (TLS, VPN, SSH).
Processing (Data in Use)
Data actively being processed in memory or applications. Needs runtime security, secure coding, memory protection.