CHAPTER 2

Theory of Cybersecurity

As described in the previous chapter, innovative ideologies of algorithms were developed and introduced in cybersecurity concepts. The theory of cybersecurity rests wholly on the ideologies of computing research. Programming languages are utilized for building cybersecurity modules.

Fundamentally, cybersecurity programs are written in programming languages such as BASIC, C, C++, and Java. Algorithm is first designed and written. In the next step, a functional design flowchart is drawn based on the algorithm written in the first step. In the third, and final, step, codes are written in the software language chosen to create cybersecurity modules and programs as shown in Figure 2.1.

Figure 2.1 Functional design ...

Get The Business of Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.