Cyber Security

  
What is Cyber-Security?

Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks. A successful cyber security approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks.


Elements of Cyber-Security
Ensuring cybersecurity requires the coordination of efforts throughout an information system, which includes:
  • Network security includes activities to protect the usability, reliability, integrity and safety of the network. Effective network security targets a variety of threats and stops them from entering or spreading on the network.
  • Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.
  • Information security protects information from unauthorized access to avoid identity theft and to protect privacy.
  • Operational security includes the processes and decisions for handling and protecting data assets. 
  • Disaster recovery planning is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster.
  • End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. 
Common Types of Cyber Threats
  • Ransomware is a type of malware that involves an attacker locking the victim's computer system files typically through encryption and demanding a payment to decrypt and unlock them.
  • Social engineering a type of attack on confidentiality, is the process of psychologically manipulating people into performing actions or giving away information.
  • phishing attacks The practice of obtaining sensitive information (e.g., passwords, credit card information) through a disguised email, phone call, or text message.
  • Malware is any file or program used to harm a computer user, such as worms, computer viruses, Trojan horses and spyware.

How to Maintain Effective Cyber-Security 
  1. Use a firewall for your Internet connection.
  2. Use strong passwords.
  3. Keep your software updated.
  4. Make backup copies of important data and information.
  5. Control physical access to your computers and network components.
  6. Install, use and regularly update antivirus and antispyware software on your computer.
  7. Don’t open attachments or click links from unknown sources.
  8. Only use trusted sites when providing your personal information.



Comments

Popular posts from this blog

What is Fringe Science?

What is Quantum Computing?