Cyber Security
Cyber
Security is the practice of safeguarding computers, servers, mobile devices,
networks, and electronic systems from malicious digital attacks. It is also
known as electronic information security or technology security. Weak cyber
security makes digital devices, networks and others vulnerable to cyber
attacks. Such attacks can be carried out by individuals or groups and are
usually aimed at stealing, accessing, changing or destroying sensitive or
personal information. Some cyber attacks also involve extorting money from a
user in exchange for stolen or decrypted data or sabotaging or interrupting
business processes.
Cyber security and its types
Ensuring a
strong cyber security involves using layers of protection to defend critical
systems against cyber threats. As these treats can differ in nature and
severity, the measures taken to combat them also vary as per purpose. Below are
the types of cyber security.
·
Network security
Shielding
your computer network from intruders comes under network security. These
networks can be both wired or wireless. Network security can be ensured using
both hardware and software technologies that help in keeping your network safe,
secure, and usable.
·
Application security
Application
security is protecting software and devices from cyber threats. This practice
describes the security measures that are taken at application level to ensure
that the data or the code of the application is not hijacked or stolen.
·
Cloud security
Cloud
security includes use of various procedures and technologies to address cyber
threats posed to cloud computing system. The practice ensures privacy and
safety of crucial data across online-based infrastructure, platforms, and
application.
·
Disaster recovery and business
continuity
It defines
how procedures and tools are used to respond to unprecedented events such as a
cyber attack, power outage, or natural disasters that can disrupt key
operations. Disaster recovery policies are used to restore the operations and
regain operating capacity of an organization in the aftermath of the
attack.
Types of cyber threats
·
Phishing
Phishing is
a type of cyber crime where criminals often deceive users into giving their
personal information or data. Such criminals use emails, text messages, or
links that appear to be from a legitimate source but are actually malicious. When
the user enters personal details such as credit card details or login
information in the pages/links, the criminal gets the access to it.
·
Malware
One of the
most common types of cyber threats, malwares are softwares that a hacker or
cyber criminal uses to access or harm personal information on a user’s system.
Some malware attacks are designed strategically that helps the attacker evade
detection by antivirus tools.
There are
different types of malwares.
§ Trojan
§ Adware
§ Spyware
§ Ransomware
§ Virus
§ Worm
§ Botnets
How to ensure cyber security?
There are
several measures that can be taken on an individual level or by an organization
to ensure security and safety of data.
·
Updating
the software or the operating system can provide you the latest security
patches and save your from potential cyber threats.
·
Use
of antivirus software is another method that is widely used to protect systems
from viruses and other factors.
·
One
must avoid clicking on emails sent by unfamiliar or unauthentic website as they
carry malicious attachments.
·
Use
of strong password is the most basic level of cyber security that can prevent
cyber criminals from gaining access to your data.
0 Comments