No such thing as a “unhackable” device exists. In general, cybersecurity can be described as ensuring that there is no unauthorized access to the network of an organization, to apps, to databases, and ultimately to all the information we want to keep safe and protected.
Cybersecurity is not about creating a “unhackable” framework. Cybersecurity is about reducing the risk of violation (confidentiality), modification (integrity), or interruption (availability) of a device without permission. Such three definitions-Confidentiality, integrity, and availability-make the foundation of every cyber security policy.
The inadequate knowledge of computer users and system administrators on computer network architecture and the functioning of their protocols do not serve to advance network security. In reality, the risks are rising. In a mechanical universe where people grasp the devices, things are functioning differently.
The network architecture has limitations and this situation is complicated because both system managers and customers have little understanding of how the system operates, its weaknesses and when those weaknesses are present in the network.
Prajakta Bhujang (19BCE10035)