By admin

What is cyber security

Introduction

Securing networks, computer systems, servers of computers, mobile phones, electrical systems, and data from theft suspicious use, and damage is defined as cyber security. It is often referred to as electronic information security. It provides security against cyber threats of different varieties including, malware, phishing, ransomware, and social engineering, which is another factor of cybersecurity. To implement this we need anti-virus software, intrusion detection systems, and training of staff awareness.

In general, we can say, cyber-security is the area that includes a variety of strategies, procedures, tools, and techniques designed to safeguard digital elements and maintain the accuracy, and validity of information in a digital world.

It is applied in business and mobile device security and is further divided into some categories.

These are the following categories of cyber security.

  • Network security
  • Application Security
  • Information Security
  • Operational Security
  • Disaster recovery and business continuity
  • End-user education
  • Network security

The action of securing computer networks from attacks including, malware software. It saves the network from the action of hackers who try to thief. Network security design policies, procedures, practices, and techniques to monitor networks for unauthorized success and data misuse. Network security only allows the computer administrator to get access to the network.

  1. Application Security

All the tasks which protects the application or software are called application security it focuses on improving, and fixing the issues of the software. It protects the software and devices from the hacker’s attacks. An application that is made for safeguarding can be accessible if it is hacked. Efficient security begins at the designing phase, very early before a program or gadget comes into use.

2. Information Security

    It aims to protect the confidentiality and integrity of data, no matter if it is in storage in transit. It saves the data from being leaked or theft and from the illegal use of it. iCloud uses information security which protects the data of the users against threats. It is often called an information risk manager which reduces the unlawful use of data.

    3. Operational Security

    The process includes making decisions about managing and protecting data assets. It includes the procedures which decide how and where data is exchanged or stored, and identify whether the right people are accessing it or not. The following operations performed be operational security including, threat assessment, critical information identification, risk analysis, countermeasure, security awareness, and training, incident response, continuous monitoring, and evaluation.

    4. Disaster recovery and business continuity

    It is about how any organization takes action in the case of cyber security or any other incident which causes the loss of data or operation. Disaster recovery provides a way for the company how they can recover its data and operation to continue the normal business. It informs the company to be prepared for the disaster before it happened. These are some aspects of disaster recovery on which it focuses including, disaster recovery, backup, and recovery, replication, recovery time objectives, recovery point objectives, maintenance and recovery, business continuity, risk assessment, business impact analysis, and crisis management.

    5. End-user education

    Aim to deal with the unknown cyber-security factors: if anyone meets with a virus accidentally he can fight with it by following the good practices of security. If an organization demands excellent security it must need to teach its people how to handle suspicious emails and not connect every USB to the computer system because most USBs spread the virus. Basically, End-user education focuses on the training of the organizational people to provide awareness. Here are some aspects of end-user education, Product Familiarization, Safety and Security, Troubleshooting and Support, Updates and Upgrades, Best Practices, and User Feedback.

    There are many methods used to treat cyber-security which are the following.

    6. Malware

    Malware means dangerous software. It is a common cyber threat, malware is software used by hackers or criminals to damage the computer of legitimate users. While using malware software hackers send suspicious emails and attachments to legitimate users cyber-criminal used it for making money and political threat.

    Here are some types of malware.

    1. Virus: it is a program attack on the files that pollutes them with harmful codes. This virus entered in the computer through many things include, USBs, Mobiles, and CDs.
    2. Trojans: Malware that takes over trustworthy programs. Cyber-criminals ask legitimate users to install trojans in their computers then they attack the system and gather data.
    3. Spyware: it is hidden software that spies all the activities of the users so the hackers misuse the data collected by spyware. Capturing the detail of credit card is an example.
    4. Ransomware: Malware through which cyber-criminals lock the user’s data and demand for money they can ask for any amount of money.
    5. Adware: Malware spread through advertising software. There is a lot of software circulating over the internet that advertises their products and gets into the user’s computer system to get information and damage the security wall. Mailjet is an example of adware software that produces malware through advertising and gets access to users’ accounts or data.
    6.    Botnets: Malware in which the user executes unethical tasks online with no permission from the users. Nowadays it become the most popular malware cyber-criminal to hack the user’s accounts and then demand money from everyone from their friend list and also share anti-religious posts.

    Conclusion

    In conclusion, cyber security works like a shield that protects organizations, computer systems, businesses, also nations from cyber threats. It introduces a wide range of procedures, strategies, tools, and techniques with the objective to safeguard computer networks, providing application security, information security, operational security, disaster recovery, and end-user education. As the world becomes digital it brought more challenges and issues cyber-security is the only solution to protect sensitive data cloud computing and devices number is increasing these attacks are also increasing. So we can say if we want to save our data or for the safety of the computing world or to safeguard the digital world era cyber-security is the only thing that can fulfill the need for our data security and also can keep our personal life secure.

    Post a comment.