Understanding Cyber Security: A Beginner's Guide

Understanding Cyber Security: A Beginner's Guide

The technique of protecting internet-connected system such as computer, servers, mobile devices, electronic system, networks,and data from malicious attacks is known as cybersecurity. We can divide cybersecurity into two parts one is cybers,and the other is security. Cyber refers to the technology that includes system, networks,programs,and data. And security is concerned with the protection of system,networks, applications, and informations.

" Cyber Security is the body of technologies, and practices designed to protect networkes, devices, programs, and data from attack, theft, damage, modification or unauthorized access"

Types Of Cyber Security

  • Network Security: It involves implementing the hardware and software to secure a computer network from unauthorized access, intruders, attacks, disruption, and misuse. This security helps an organization to protect its assets against external and internal threats.

  • Application Security: It involves protecting the software and devices from unwanted threats. This protection can be done by constantly updating the apps to ensure they are secure from attacks. Successful security begins in the design stage, writing source code, validation, threat modeling, etc., before a program or device is deployed.

  • Information or Data Security: It involves implementing a strong data storage mechanism to maintain the integrity and privacy of data, both in storage and in transit.

  • Identity management: It deals with the procedure for determining the level of access that each individual has within an organization.

  • Operational Security: It involves processing and making decisions on handling and securing data assets.

  • Mobile Security: It involves securing the organizational and personal data stored on mobile devices such as cell phones, computers, tablets, and other similar devices against various malicious threats. These threats are unauthorized access, device loss or theft, malware, etc.

  • Cloud Security: It involves in protecting the information stored in the digital environment or cloud architectures for the organization. It uses various cloud service providers such as AWS, Azure, Google, etc., to ensure security against multiple threats.

  • Disaster Recovery and Business Continuity Planning: It deals with the processes, monitoring, alerts, and plans to how an organization responds when any malicious activity is causing the loss of operations or data. Its policies dictate resuming the lost operations after any disaster happens to the same operating capacity as before the event.

  • User Education: It deals with the processes, monitoring, alerts, and plans to how an organization responds when any malicious activity is causing the loss of operations or data. Its policies dictate resuming the lost operations after any disaster happens to the same operating capacity as before the event.

Improtance of Cyber Security

  • Network Security: It involves implementing the hardware and software to secure a computer network from unauthorized access, intruders, attacks, disruption, and misuse. This security helps an organization to protect its assets against external and internal threats.

  • Application Security: It involves protecting the software and devices from unwanted threats. This protection can be done by constantly updating the apps to ensure they are secure from attacks. Successful security begins in the design stage, writing source code, validation, threat modeling, etc., before a program or device is deployed.

Latest Cyber Threats

Romance Scams

The U.S. government found this cyber threat in February 2020. Cybercriminals used this threat through dating sites, chat rooms, and apps. They attack people who are seeking a new partner and duping them into giving away personal data.

Dridex Malware

It is a type of financial Trojan malware identifies by the U.S. in December 2019 that affects the public, government, infrastructure, and business worldwide. It infects computers through phishing emails or existing malware to steal sensitive information such as passwords, banking details, and personal data for fraudulent transactions. The National Cyber Security Centre of the United Kingdom encourages people to make sure their devices are patched, anti-virus is turned on and up to date, and files are backed up to protect sensitive data against this attack.

Emotet Malware

Emotet is a type of cyber-attack that steals sensitive data and also installs other malware on our device. The Australian Cyber Security Centre warned national organizations about this global cyber threat in 2019.

The following are the system that can be affected by security breaches and attacks:

  • Communication: Cyber attackers can use phone calls, emails, text messages, and messaging apps for cyberattacks.

  • Finance: This system deals with the risk of financial information like bank and credit card detail. This information is naturally a primary target for cyber attackers.

  • Governments: The cybercriminal generally targets the government institutions to get confidential public data or private citizen information.

  • Transportation: In this system, cybercriminals generally target connected cars, traffic control systems, and smart road infrastructure.

  • Healthcare: A cybercriminal targets the healthcare system to get the information stored at a local clinic to critical care systems at a national hospital.

  • Education: A cybercriminals target educational institutions to get their confidential research data and information of students and employees.

Benefits of Cyber Security

  • Cyberattacks and data breach protection for businesses.

  • Data and network security are both protected.

  • Unauthorized user access is avoided.

  • After a breach, there is a faster recovery time.

  • End-user and endpoint device protection.

  • Regulatory adherence.

  • Continuity of operations.

THANKYOU