Posts

Showing posts from January, 2024

Advantages and disadvantages of cyber security

Image
  Cyber Security  is the combination of two words,  cyber + security,  where cyber refers to the internet and security means the protection of cyber. The human personal, professional, social, and working space is ruled and controlled by the internet. Being surrounded by the internet makes its growth a never-ending era because it has become essential to the day-to-day human lifestyle. Now we can't even imagine our life without the internet, and the advancement of technologies is making it fast and easy. All the cyber security principles are grouped under  governing, detecting, protecting, and responding to  activity, and these principles are: 1. It secure configuration 2. Provide network security 3. Manage user privileges 4. User education and awareness 5. Monitoring 6. Malware prevention 7. Incident management 8. Home and mobile working 9. Removable media controls 10. Acceptance of security breaches 11. Open design 12. Fail-safe defaults 13. Work factor 14....

Goals of cybersecurity

Image
 The objective of Cybersecurity is to protect information from being stolen, compromised or attacked. Cybersecurity can be measured by at least one of three goals- Protect the confidentiality of data. Preserve the integrity of data. Promote the availability of data for authorized users. These goals form the confidentiality, integrity, availability (CIA) triad, the basis of all security programs. The CIA triad is a security model that is designed to guide policies for information security within the premises of an organization or company. This model is also referred to as the AIC (Availability, Integrity, and Confidentiality) triad to avoid the confusion with the Central Intelligence Agency. The elements of the triad are considered the three most crucial components of security The CIA criteria are one that most of the organizations and companies use when they have installed a new application, creates a database or when guaranteeing access to some data. For data to be completely secu...

Types of cybersecurity

Image
 Every organization's assets are the combinations of a variety of different systems. These systems have a strong cybersecurity posture that requires coordinated efforts across all of its systems. Therefore, we can categorize cybersecurity in the following sub-domains: 1) Network Security: It involves implementing the hardware and software to secure a computer network from unauthorized access, intruders, attacks, disruption, and misuse. This security helps an organization to protect its assets against external and internal threats. 2) Application Security: It involves protecting the software and devices from unwanted threats. This protection can be done by constantly updating the apps to ensure they are secure from attacks. Successful security begins in the design stage, writing source code, validation, threat modeling, etc., before a program or device is deployed. 3) Information or Data Security: It involves implementing a strong data storage mechanism to maintain the integrity and...

Types of cyber security threats

Image
A threat in cybersecurity is a malicious activity by an individual or organization to corrupt or steal data, gain access to a network, or disrupts digital life in general. The cyber community defines the following threats available today: 1. Malware Malware means malicious software, which is the most common cyber attacking tool. It is used by the cybercriminal or hacker to disrupt or damage a legitimate user's system. The following are the important types of malware created by the hacker: Virus : It is a malicious piece of code that spreads from one device to another. It can clean files and spreads throughout a computer system, infecting files, stoles information, or damage device. Spyware : It is a software that secretly records information about user activities on their system.  For example , spyware could capture credit card details that can be used by the cybercriminals for unauthorized shopping, money withdrawing, etc. Trojans : It is a type of malware or code that appears as ...

Introduction to cyber security

Image
What is cyber security? The technique of protecting internet-connected systems such as computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as cybersecurity. We can divide cybersecurity into two parts one is cyber, and the other is security. Cyber refers to the technology that includes systems, networks, programs, and data. And security is concerned with the protection of systems, networks, applications, and information. In some cases, it is also called electronic information security or information technology security. Cyber Security is the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, theft, damage, modification or unauthorized access." "Cyber Security is the set of principles and practices designed to protect our computing resources and online information against threats." Importance of cybersecurity   Today we live in a digital era where all a...