What is Cyber Security? | Definition, Types, and User Protection

 

What is Cyber Security?

Cyber security is the engineering and implementation of the latest technologies, processes & controls to protect our devices, computer OS, software, networks, applications, programs & data from any kind of malicious cyber-attack.

 

Cyber Security

Why is it so necessary?

In this competitive world where everyone wants to be the best of themselves in terms of quality, credibility & capital. To be the best, one must keep his /her data secured from competitors. As in the game of chess, if the opponent gets your next move your chances of losing increase. Likewise, if your rival gets your important credentials data, then he is at advantage.

“Data is the new oil”. Similar to oil, unfurnished information isn't priced in and of itself; rather, the value is compounded when it is gathered rapidly, completely, accurately, and inter-connected to other relevant data.

Data can tell us a vast amount about an organization's strengths and weaknesses. Data holds the power to establish or demolish organizations.

Therefore data is a very powerful asset, which must be protected from being in the wrong hands.

DATA IS POWER


 

Cyber Threats:

A malicious act that aims to destroy data, steal data, or otherwise interfere with digital life is referred to as a cyber or cybersecurity threat. Computer viruses, data breaches, DOS assaults, and other attack methods are examples of cybercrime.

Cyber risks also refer to the potential for a successful cyber assault with the intent of stealing sensitive data, damaging or disrupting a computer network, or gaining illegal entry to an information technology asset. Cyber threats may originate from a company's own trusted employees or may come from distant, unidentified parties.

 

Cyber Threat

 Types of Cyber Threats:

Some of the Cyber Threats are as follows: 

1. App-based threats (malicious apps)
2. Web-based threats (phishing)
3. Network threats (free Wi-Fi)
4. Physical threats (no PIN or biometric authentication).
5. Denial of Service (DOS) Attack
6. Negative Commentary Attacks
7. Cross-Site Scripting (XSS) Attack
8. SQL Injection Attack
9. cryptojacking
10. Ransomware

 

Types Of Cyber Security

What Sources Do Cyber Threats Have?

   Sources of Cyber Threats are:

1.  Antagonizing Nation-States
2.  Hacktivists
3.  Corporate Spies and Organized Crime Organizations
4.  Terrorist Groups
 


Therefore, Cyber Security is not a choice anymore. It is mandatory! 

CYBER THREAT


Goals Of Cyber Security

Cyber Security has three primary goals :  

      1. Confidentiality: Maintaining Data Privacy 
      2. Integrity: Preserving data integrity 
      3. Accessibility: limiting access to authorized people only 

CIA Triad

All security programs are built on the CIA triad of availability, secrecy, and integrity. The CIA triangle is a security paradigm that directs information security policies inside of a corporation or organization's walls. The elements of this trio are seen to be the most important security factors.

Cyber Security Goals

                           

How can we Improve Cyber Security?

Steps to bring resilience towards cyberattacks.
  1.  Apply patches and security updates
  2.  Use strong passwords
  3.  Use multi-factor authentication (MFA) 
  4.  Use antivirus software and ensure that it works
  5.  Implement WAF (Web Application Firewall )
  6.  Control access to your systems
  7.  Wi-Fi Security
  8.  Ensure Endpoint Protection
  9.  Updated software patches
10.  Anti-malware and Antivirus Software

 

 

Improve your Cyber Security 

   Security Technologies

  Some of the Latest Security Technologies are listed below :
      1.  Data Loss Prevention
      2.  Intrusion Detection System
      3.  Intrusion Prevention System
      4.  Security Incident and Event Management
      5.  Security tools like Orca, QRadar, Cloudlytics, etc
      6.  Antivirus

Cyber Security Advanced Technology

 By-
 Rohit Halsana
 (KIET Group Of Institution)

Comments

Post a Comment