CYBER SECURITTY

Refrence: https://www.commercialintegrator.com/networks/iot/cybersecurity-basics-terms-definitions-integrators-should-know/


What is CYBER SECURITY?

Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.

A strong cybersecurity strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an organization's or user's systems and sensitive data. Cybersecurity is also instrumental in preventing attacks that aim to disable or disrupt a system's or device's operations.

Why is cyber security important?

Cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A significant portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences. Organizations transmit sensitive data across networks and to other devices in the course of doing business, and cyber security describes the discipline dedicated to protecting that information and the systems used to process or store it. As the volume and sophistication of cyber attacks grow, companies and organizations, especially those that are tasked with safeguarding information relating to national security, health, or financial records, need to take steps to protect their sensitive business and personnel information. As early as March 2013, the nation’s top intelligence officials cautioned that cyber attacks and digital spying are the top threat to national security, eclipsing even terrorism.

Challenges of cyber security :

 

       Refrence : https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security

  • Network security: The process of protecting the network from unwanted users, attacks and intrusions.
  • Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.
  • Endpoint security: Remote access is a necessary part of business, but can also be a weak point for data. Endpoint security is the process of protecting remote access to a company’s network.
  • Data security: Inside of networks and applications is data. Protecting company and customer information is a separate layer of security.
  • Identity management: Essentially, this is a process of understanding the access every individual has in an organization.
  • Database and infrastructure security: Everything in a network involves databases and physical equipment. Protecting these devices is equally important.
  • Cloud security: Many files are in digital environments or “the cloud”. Protecting data in a 100% online environment presents a large amount of challenges.
  • What are the different types of cybersecurity threats?

    The process of keeping up with new technologies, security trends and threat intelligence is a challenging task. It is necessary in order to protect information and other assets from cyberthreats, which take many forms. Types of cyberthreats include:

              Refrence : https://www.parallels.com/blogs/ras/smart-card-authentication/?amp

    o   Malware is a form of malicious software in which any file or program can be used to harm a computer user. This includes worms, viruses, Trojans and spyware.
    o   Ransomware is another type of malware. It involves an attacker locking the victim's computer system files -- typically through encryption -- and demanding a payment to decrypt and unlock them.
    o   Social engineering is an attack that relies on human interaction to trick users into breaking security procedures to gain sensitive information that is typically protected.
    o   Phishing is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data, such as credit card or login information

     

      How to protect yourself against cybersecurity threats:

      Refrence: https://www.ul.com/news/cyber-security-fire-protection-systems


      • Update your software and operating system:This means you benefit from the latest security patches.
      •   Use anti-virus software:Security solutions like Kaspersky Total Security will detect and removes threats. Keep your software updated for the best level of protection.
      • Use strong passwords:Ensure your passwords are not easily guessable.
      • Do not open email attachments from unknown senders:These could be infected with malware.
      • Do not click on links in emails from unknown senders or unfamiliar websites:This is a common way that malware is spread
      • Avoid using unsecure WiFi networks in public places:Unsecure networks leave you vulnerable to man-in-the-middle attacks.

       

    Comments

    Post a Comment

    Popular posts from this blog

    A reunion: Bringing Humans back to nature

    screen and technology addiction