![]() |
Cyber Security |
Definition of Cyber Security
Cyber security is the practice of
protecting computers, servers, mobile devices, electronic systems, networks,
and data from malicious attacks. Also referred to as information technology
security or electronic information security. The term applies in a variety of
situations, from business to mobile computing, and can be divided into several
general categories.
Types of cyber security
Critical Infrastructure Security:
Consists of cyber-physical systems such as power grids and water purification
systems.
Network Security: Protect your
infrastructure by protecting your internal network from intruders. Examples of
network security include implementing two-factor authentication (2FA) and
strong new passwords.
Application Security: Use
software and hardware to protect against external threats that may emerge
during application development. Examples are antivirus programs, firewalls, and
encryption.
Information Security: Also known
as InfoSec, it protects both physical and digital data (basically any form of
data) from unauthorized access, use, modification, disclosure, deletion, or
other fraudulent activities.
Cloud Security: A software-based
tool that protects and monitors data in a cloud to help eliminate the risks
associated with on-premises attacks.
Data Loss Prevention: consists of
developing policies and processes to handle and prevent data loss and
developing recovery policies in the event of a cybersecurity breach. This
includes setting data storage network permissions and policies.
End-user education: We recognize
that cybersecurity systems are potentially the weakest links, that is, as strong
as the people who use them. Educating end users includes teaching users to
follow best practices such as not clicking unknown links or downloading
suspicious attachments in emails.
Types of cyber threats
Malware: Malicious software such
as computer viruses, spyware, Trojan horses, and keyloggers.
Ransomware-malware that locks or
encrypts data until the ransom is paid.
Phishing Attacks: The act of
obtaining sensitive information (passwords, credit card information, etc.) via
spoofed emails, phone calls, or text messages.
Social Engineering: Personal
psychological manipulation to obtain sensitive information. Often overlaps with
phishing.
Advanced Persistent Threat: An
attack in which an unauthorized user gains access to a system or network and is
not detected for an extended period of time.
Cyber Security Safety Tips
Update your software and
operating system: The latest security patches are available.
Use antivirus software and Update
your software for the highest level of protection.
Use strong passwords: Prevent
passwords from being easily guessed.
Do not open email attachments
from unknown senders. These may be infected with malware.
Don't click links in emails from
unknown senders or strange websites. This is a common way to spread malware.
Do not use insecure WiFi networks
in public places. Insecure networks are vulnerable to mid-range attacks.
Read More Articles: Nanorobots Applications In Medical Industry
No comments:
Post a comment