Cybersecurity Fundamentals

Req 3a — Systems to Protect

3a.
Describe three types of computer systems that need protecting and explain why.

When most people hear “computer system,” they think of a laptop or desktop. But the reality is far bigger. Computer systems run hospitals, control traffic lights, purify drinking water, and fly airplanes. When these systems get attacked, the consequences go way beyond a frozen screen or lost files — people’s lives can be at risk.

What Counts as a “Computer System”?

A computer system is any combination of hardware, software, and data working together to perform a task. That includes your laptop, sure — but it also includes the systems behind ATMs, the software managing your school’s grades, and the controllers that keep a power plant running safely.

Here are categories of systems that need cybersecurity protection, with examples of what happens when they are compromised.

Personal Devices and Home Networks

This is the layer closest to you — your phone, laptop, tablet, gaming console, and home Wi-Fi router. These devices store your personal information: photos, messages, passwords, financial data (if you shop online), and location history.

Why protect them?

Business and Enterprise Systems

Companies and organizations run computer systems that store customer data, process financial transactions, manage inventory, and coordinate employees. A single breach can expose millions of people’s personal information.

Why protect them?

Think about the businesses you interact with — your doctor’s office (medical records), your school (grades, personal info), your favorite online store (payment details). Every one of those organizations must protect the data you have entrusted to them.

Critical Infrastructure

This is where cybersecurity becomes a matter of life and death. Critical infrastructure refers to the systems that keep society functioning: power grids, water treatment plants, hospitals, transportation networks, and emergency services.

Why protect them?

Choosing Your Three for Your Counselor

The requirement asks you to describe three types and explain why they need protection. You can pick from the categories above or identify your own — government systems, military networks, financial markets, educational institutions, and healthcare systems are all valid choices.

For each one, be ready to explain:

  1. What the system does — its purpose and what data it handles
  2. What could go wrong — specific consequences of a successful attack
  3. Who is affected — not just the organization, but the people who depend on it
Cybersecurity in Critical Infrastructure A detailed look at how cybersecurity protects the power grids and smart grids that keep our lights on.
Three concentric layers of computer systems: Personal Devices, Business Systems, and Critical Infrastructure