This is the first post of a series of articles on cybersecurity. It’ll be a long series because cybersecurity is a complex subject. I will first provide some overview articles on cybersecurity such as what it is, why we need it, and how to implement it. The articles will be very general and non-technical.
After the overview articles, I will delve into the specifics. On these more specific articles, my goal is to get somewhat technical but still present the information in an easy-to-understand way so you won’t have to have a programming background to understand each subject matter. Right now, I intend to cover things like ransomware, denial of service attacks, two-factor authentication, cryptography and how it works with network security, artificial intelligence and how it’s used to identify new threats, and much more.
Because of the technical details involved, I expect some of the articles to require a lot of research. Life, of course, has other distractions, so I might not be able to post a new article every other week like I’ve been doing for this website. I might even write articles on other subjects in between cybersecurity articles. Please be patient, and there will be new articles from time to time.
For your convenience, below I will provide links to every article in this series. It’ll be in an outline format, and sometimes I will insert articles in between already published articles. If you are interested in reading the series, please check back from time to time for new articles. Even easier, you can follow me on Twitter or Facebook. I will always notify followers of a new article and post/tweet a link.
Finally, for articles in this series, I won’t be rating them with the Laziness Scale. Given the nature of the articles—i.e. to inform and teach an entire subject matter—the Laziness Scale doesn’t seem to fit. I do, however, hope that you think my articles are Lazy Worthy because they present the information in an easier to understand way than other similar articles out there on the Internet.