Summary
This Cybersecurity onAir hub is the top of a future network of online Hubs that focus on cybersecurity challenges and how leaders in universities, government, nonprofits, and the private sector are developing and implementing innovative solutions.
If you or your organization would like to curate a post within this hub (e.g. a profile post on your organization), contact cyber@onair.cc.
Any web user, on a laptop, desktop computer or smartphone connected to the internet, can freely and easily access content on any Cyber or other onAir Hub.
OnAir Post: Cybersecurity onAir Hub
News
PBS NewsHour, January 19, 2021 – 11:00 am (ET)
About
LEARN.
Cyber onAir curators aggregate and organize the best publicly available information.
All topical Hub content is under the Creative Commons Attribution-NonCommercial license which permits content sharing and adaptation by nonprofit organizations as long as proper attribution is given to its author(s) and is used for non-commercial purposes. Content and moderation guidelines reinforce our commitment to fact-based, comprehensive content and civil and honest discourse. See Terms of Service for more information.
Simply visiting a Hub does not expose your identity publicly. When you submit your email address to become a Hub member, it is your option to have your address displayed. All post curators are encouraged to use a free @onair.cc email address. Cyber onAir will not sell your information. See our Privacy Policy for more information.
DISCUSS.
As an onAir member, you can participate in forum discussions in posts on Hubs that have student onAir Curators moderating the discussions to keep them civil and positive. You can also discuss your concerns and ideas as part of a live zoom meeting with representatives and candidates.
ENGAGE.
Engage with Cyber onAir through curating posts, moderating forums, producing online interviews and discussions as well as donating to and sponsoring Cyber onAir.
Overview
Cybersecurity is about protecting computer systems, networks, and electronic data from unauthorized access, damage, or theft. It involves a combination of technologies, processes, and practices to ensure the confidentiality, integrity, and availability of information and to guard against threats like cybercrime, cyber-attacks, and cyberterrorism. Key aspects include securing devices and networks, managing digital identities, and developing strategies to prevent and respond to breaches.
Core Concepts
- Protection:
Safeguarding networks, devices (like laptops, smartphones, and servers), and data from harm.
- Confidentiality, Integrity, and Availability:
The three pillars of information security. Cybersecurity aims to ensure that only authorized individuals can access data (confidentiality), that data is accurate and unaltered (integrity), and that systems and data are accessible when needed (availability).
- Threats:A wide range of malicious actors and activities, including criminal hackers, politically motivated attacks, and cyberterrorism.
Key practices
- Network and Endpoint Security:
Protecting computer networks and individual devices like desktops, laptops, and mobile phones.
- Identity and Access Management:Safeguarding the digital identities of individuals, devices, and organizations, and controlling who can access what resources.
- Risk Assessment:Evaluating potential vulnerabilities and developing security policies and procedures to mitigate risk.
- Data Encryption:Scrambling data so it is unreadable without the proper key, protecting it from unauthorized access.
- Incident Response:Having a plan in place to manage and recover from a security breach.
- User Education:Teaching people to protect themselves by using strong passwords, being wary of phishing scams, and keeping software updated.
Why it’s important
- Business and Organizations:Protects critical assets, maintains customer trust, and secures a company’s reputation.
- Individuals:Helps protect personal information, financial details, and digital lives from theft and fraud.

