Cyber security and its significance

Cyber Security

Cyber Security is the practice of safeguarding computers, servers, mobile devices, networks, and electronic systems from malicious digital attacks. It is also known as electronic information security or technology security. Weak cyber security makes digital devices, networks and others vulnerable to cyber attacks. Such attacks can be carried out by individuals or groups and are usually aimed at stealing, accessing, changing or destroying sensitive or personal information. Some cyber attacks also involve extorting money from a user in exchange for stolen or decrypted data or sabotaging or interrupting business processes.



Cyber security and its types

Ensuring a strong cyber security involves using layers of protection to defend critical systems against cyber threats. As these treats can differ in nature and severity, the measures taken to combat them also vary as per purpose. Below are the types of cyber security.

·        Network security

Shielding your computer network from intruders comes under network security. These networks can be both wired or wireless. Network security can be ensured using both hardware and software technologies that help in keeping your network safe, secure, and usable.

·        Application security

Application security is protecting software and devices from cyber threats. This practice describes the security measures that are taken at application level to ensure that the data or the code of the application is not hijacked or stolen.

·        Cloud security

Cloud security includes use of various procedures and technologies to address cyber threats posed to cloud computing system. The practice ensures privacy and safety of crucial data across online-based infrastructure, platforms, and application.

·        Disaster recovery and business continuity

It defines how procedures and tools are used to respond to unprecedented events such as a cyber attack, power outage, or natural disasters that can disrupt key operations. Disaster recovery policies are used to restore the operations and regain operating capacity of an organization in the aftermath of the attack. 

Types of cyber threats

·        Phishing

Phishing is a type of cyber crime where criminals often deceive users into giving their personal information or data. Such criminals use emails, text messages, or links that appear to be from a legitimate source but are actually malicious. When the user enters personal details such as credit card details or login information in the pages/links, the criminal gets the access to it.

·        Malware

One of the most common types of cyber threats, malwares are softwares that a hacker or cyber criminal uses to access or harm personal information on a user’s system. Some malware attacks are designed strategically that helps the attacker evade detection by antivirus tools.

There are different types of malwares.

§  Trojan

§  Adware

§  Spyware

§  Ransomware

§  Virus

§  Worm

§  Botnets

 

How to ensure cyber security?

There are several measures that can be taken on an individual level or by an organization to ensure security and safety of data.

·        Updating the software or the operating system can provide you the latest security patches and save your from potential cyber threats.

·        Use of antivirus software is another method that is widely used to protect systems from viruses and other factors.

·        One must avoid clicking on emails sent by unfamiliar or unauthentic website as they carry malicious attachments.

·        Use of strong password is the most basic level of cyber security that can prevent cyber criminals from gaining access to your data.

 

 

 

 

 

 

 

 

 

Post a Comment

0 Comments