What is Cyber Security? | Definition, Types, and User Protection
What is Cyber Security?
Cyber security is the engineering and implementation of the latest technologies, processes & controls to protect our devices, computer OS, software, networks, applications, programs & data from any kind of malicious cyber-attack.
![]() |
Cyber Security |
Why is it so necessary?
In this
competitive world where everyone wants to be the best of themselves in terms of
quality, credibility & capital. To be the best, one must keep his /her data
secured from competitors. As in the game of chess, if the opponent gets your
next move your chances of losing increase. Likewise, if your rival gets your important
credentials data, then he is at advantage.
“Data is
the new oil”. Similar to oil, unfurnished information isn't priced in and of
itself; rather, the value is compounded when it is gathered rapidly,
completely, accurately, and inter-connected to other relevant data.
Data can
tell us a vast amount about an organization's strengths and weaknesses. Data
holds the power to establish or demolish organizations.
Therefore data is a very powerful asset, which must be protected from being in the wrong hands.
![]() |
DATA IS POWER |
Cyber Threats:
A malicious act that aims
to destroy data, steal data, or otherwise interfere with digital life is
referred to as a cyber or cybersecurity threat. Computer viruses, data
breaches, DOS assaults, and other attack methods are examples of cybercrime.
Cyber risks also refer to
the potential for a successful cyber assault with the intent of stealing
sensitive data, damaging or disrupting a computer network, or gaining illegal
entry to an information technology asset. Cyber threats may originate from a
company's own trusted employees or may come from distant, unidentified parties.
![]() |
Cyber Threat |
Types of Cyber Threats:
Some of the Cyber Threats are as follows:
1. App-based threats (malicious apps)
2. Web-based threats (phishing)
3. Network threats (free Wi-Fi)
4. Physical threats (no PIN or biometric authentication).
5. Denial of Service (DOS) Attack
6. Negative Commentary Attacks
7. Cross-Site Scripting (XSS) Attack
8. SQL Injection Attack
9. cryptojacking
10. Ransomware
![]() |
Types Of Cyber Security |
What Sources Do Cyber Threats Have?
Sources of Cyber Threats are:
1. Antagonizing Nation-States
2. Hacktivists
3. Corporate Spies and Organized Crime Organizations
4. Terrorist Groups
Therefore, Cyber Security is not a choice anymore. It is mandatory!
![]() |
CYBER THREAT |
Goals Of Cyber Security
Cyber Security has three primary goals :
2. Integrity: Preserving data integrity
3. Accessibility: limiting access to authorized people only
![]() |
CIA Triad |
All security programs are built on the CIA triad of availability, secrecy, and integrity. The CIA triangle is a security paradigm that directs information security policies inside of a corporation or organization's walls. The elements of this trio are seen to be the most important security factors.
![]() |
Cyber Security Goals |
How can we Improve Cyber Security?
1. Apply patches and security updates
2. Use strong passwords
3. Use multi-factor authentication (MFA)
4. Use antivirus software and ensure that it works
5. Implement WAF (Web Application Firewall )
6. Control access to your systems
7. Wi-Fi Security
8. Ensure Endpoint Protection
9. Updated software patches
![]() |
Improve your Cyber Security |
Security Technologies
Some of the Latest Security Technologies are listed below
:
1. Data Loss Prevention
2. Intrusion Detection System
3. Intrusion Prevention System
4. Security Incident and Event
Management
5. Security tools like Orca, QRadar,
Cloudlytics, etc
6. Antivirus
![]() |
Cyber Security Advanced Technology |
Rohit Halsana
(KIET Group Of Institution)
Great job
ReplyDelete