Short blog series (part77) Cybersecurity basics
- Manyanshi Joshi
- 11 hours ago
- 5 min read

Cybersecurity is about protecting computers, networks, and dataĀ from being stolen, damaged, or messed with. That includes your phone, laptop, Wi-Fi, cloud accounts, and even smart devices.
The 3 core goals (CIA Triad)
These show up everywhereĀ in cybersecurity:
ConfidentialityĀ ā Only the right people can see the data(passwords, encryption, access controls)
IntegrityĀ ā Data isnāt altered without permission(hashing, checksums, version control)
AvailabilityĀ ā Systems are up when you need them(backups, redundancy, DDoS protection)
Common threats you should know
You donāt need to be a hacker to understand these:
PhishingĀ ā Fake emails/texts tricking you into giving info
MalwareĀ ā Malicious software (viruses, ransomware, spyware)
Password attacksĀ ā Brute force, credential stuffing
Man-in-the-MiddleĀ ā Someone intercepts your connection
Social engineeringĀ ā Tricking people instead of hacking tech
š” Fun fact: humans are usually the weakest link, not computers.
Basic security hygiene (non-negotiables)
If you do onlyĀ these, youāre already ahead of most people:
1. Strong, unique passwords
Use a password manager
Never reuse passwords
Length > complexity
2. Two-Factor Authentication (2FA)
App-based (Authenticator) > SMS
Stops most account takeovers cold
3. Updates matter
OS, apps, browsers, router firmware
Updates = patched security holes
4. Backups
Follow 3-2-1 rule:
3 copies
2 different media
1 offsite
Network basics
FirewallĀ ā Gatekeeper for network traffic
HTTPSĀ ā Encrypted web traffic (lock icon š)
VPNĀ ā Encrypts traffic on untrusted networks (like public Wi-Fi)
For organizations (high-level)
Least privilegeĀ ā Users get only what they need
Logging & monitoringĀ ā You canāt protect what you canāt see
Incident response planĀ ā Know what to do beforeĀ something breaks
Security trainingĀ ā Teach people how attacks actually happen
Mindset shift (this matters)
Cybersecurity is not:ā āperfect protectionā
It is:ā risk managementā layered defensesā assuming breaches will happen
Your personal threat model (quick version)
Youāre mainly defending against:
Account takeovers
Identity theft
Scams & phishing
Device loss or theft
Snooping on public Wi-Fi
Not nation-state hackers. Relax š
The Big 7 personal security rules
1. Passwords (this is huge)
Use a password managerĀ (Bitwarden, 1Password, etc.)
Every account gets a unique password
Long > complicated (20+ characters is chefās kiss)
š« Never reuse passwords. Ever.
2. Turn on 2FA everywhere
Priority order:
Authenticator app
Hardware key (best)
SMS (better than nothing)
Protect email firstĀ ā if someone gets that, they get everything.
3. Lock down your email
Your email is your digital master key:
Strong unique password
2FA enabled
Recovery email + phone updated
Review āactive sessionsā regularly
If your email is safe, most damage stops there.
4. Phishing radar (trust nothing by default)
Red flags:
Urgency (āAct now!ā)
Unexpected attachments
Links that almostĀ look right
Messages asking for codes or passwords
Rule of thumb:š Donāt click links ā go directly to the site/app
5. Secure your devices
Phone & laptop basics:
Auto-lock enabled
Strong PIN / password (not just swipe)
Full-disk encryption (on by default for most modern devices)
Enable āFind My Deviceā
If stolen, you want remote wipe.
6. Public Wi-Fi survival
Avoid logging into important accounts
Use HTTPS (modern browsers help)
Consider a VPNĀ on airports/cafes/hotels
Turn off auto-connect to Wi-Fi
Hot take: mobile data > free Wi-Fi.
7. Backups = insurance
Use the 3-2-1 rule:
Cloud backup (Google Drive, iCloud, etc.)
Local backup (external drive)
One offline or offsite copy
Ransomware doesnāt scare people who have backups š
Social media & privacy
Set profiles to private where possible
Donāt overshare travel plans
Remove old apps with account access
Watch āsecurity questionsā (motherās maiden name ā real)
Your posts are intel. Treat them that way.
Quick personal security checklist
If you want a fast win, do this today:
Ā Password manager installed
Ā Email secured with 2FA
Ā Phone auto-lock + encryption
Ā Backups enabled
Ā Removed unused apps & extensions
One mindset that saves people
Assume breaches happen ā prepare to recover fast.
Thatās real security.
First: how cybersecurity careers actually work
Most people donāt start inĀ security.
Typical entry paths:
IT support / helpdesk
Networking
System administration
Software / scripting
Security sits on topĀ of those skills.
š§± IT foundations ā š security specialization
Phase 1: Core foundations (non-negotiable)
If you skip these, security will feel like magic spells.
1. Networking basics
You must understand:
TCP/IP, DNS, HTTP/S
Ports & protocols
Firewalls, NAT, VPNs
Learn with:
Free: Professor Messer (Network+)
Practice: Wireshark basics
2. Operating systems
Focus on Linux + Windows:
Filesystems
Users & permissions
Processes & services
Logs
Hands-on ideas:
Install Linux (Ubuntu/Kali) in a VM
Learn basic Bash + PowerShell
3. Security fundamentals
Core concepts:
CIA triad
Authentication vs authorization
Encryption & hashing
Threats & vulnerabilities
Cert-style intro:
CompTIA Security+Ā (gold standard beginner cert)
Phase 2: Choose a direction
After foundations, you specialize. Here are the main paths:
šµ Blue Team (Defense)
What you do:Ā detect, prevent, respond
Roles:
SOC Analyst
Incident Responder
Security Engineer
Skills:
SIEM tools (Splunk, Sentinel)
Log analysis
Threat detection
Incident response
Practice:
TryHackMe (blue paths)
Home lab with logs + alerts
š“ Red Team (Offense)
What you do:Ā break in (legally)
Roles:
Penetration Tester
Red Teamer
Bug bounty hunter
Skills:
Linux, networking, scripting
Web app security
Exploits & tools (Nmap, Burp, Metasploit)
Practice:
TryHackMe / Hack The Box
WebGoat, DVWA
ā ļø Not beginner-friendly without foundations.
š£ Purple Team
Blend of red + blue. Very valuable later.
š¢ Governance, Risk & Compliance (GRC)
What you do:Ā policies, audits, risk
Roles:
Risk Analyst
Compliance Officer
Security Consultant
Skills:
Risk frameworks (ISO 27001, NIST)
Policies & controls
Communication
Less technical, more business.
Phase 3: Hands-on labs (this is where people win)
Security is learn-by-doing.
Best platforms:
TryHackMeĀ ā beginner ā intermediate
Hack The BoxĀ ā harder, realistic
OverTheWireĀ ā Linux fundamentals
Build a home lab:
VirtualBox / VMware
1 attacker VM + 1 target VM
Practice safely
Phase 4: Certifications (use strategically)
Certs donāt make you skilled, but they open doors.
Beginner:
ITF+ (optional)
Network+
Security+
Intermediate:
Blue: CySA+
Red: eJPT, PNPT
Cloud: AWS Security Specialty
Advanced:
CISSP (experience required)
OSCP (hands-on, tough)
Phase 5: Getting your first job
What actually helps:
Home lab projects (document them)
GitHub (scripts, notes, writeups)
LinkedIn + networking
Internships / apprenticeships
Entry-level job titles:
SOC Analyst
Junior Security Analyst
IT Support ā Security transition
Timeline (realistic)
0ā3 months: IT + networking basics
3ā6 months: Security fundamentals + labs
6ā12 months: Specialize + cert + job hunt
Consistency > speed.
Brutally honest advice
Donāt chase tools before concepts
Donāt ācert collectā
Donāt compare your pace to YouTubers
Security rewards curiosity and persistence.
Conclusion
Cybersecurity is the practice of protecting systems, networks, and data from digital threats in an increasingly connected world. At its core, it focuses on maintaining confidentiality, integrity, and availabilityĀ of information. While cyber threats such as phishing, malware, and data breaches continue to evolve, most successful attacks exploit basic weaknesses like poor passwords, lack of updates, and low user awareness.
Understanding cybersecurity basics is not just for IT professionalsāit is a responsibility shared by individuals and organizations alike. Simple practices such as using strong, unique passwords, enabling multi-factor authentication, keeping systems updated, and backing up data significantly reduce risk. Cybersecurity is not about achieving perfect security, but about managing risk through layered defenses and informed decision-making.
As technology continues to advance, having a strong foundation in cybersecurity basics empowers users to protect their digital lives and prepares learners for deeper study or careers in the field. In short, awareness, good habits, and continuous learning are the first and most important lines of defense in cybersecurity.
Thanks for reading!!!!!



Comments