What is Cyber Security?
Cybersecurity is the convergence of people, processes and technology that come together to protect organizations, individuals or networks from digital attacks. Please learn about Common Journal.
Cybersecurity implies to the procedure of safeguarding computers, servers, mobile devices, electronic systems, networks, and information from malicious attacks. it is also referred to as info technology security or electronic info security. The term applies to many types of environments, from business to mobile computing, and may be divided into several familiar classifications.
- Network security enables us to protect our computer networks and maintain critical infrastructure security form external attacks.
- Application security focuses on keeping software packages and devices freed from threats.
- Information security protects the integrity and privacy of data while storage and while transfer.
- Operational security includes the processes and permissions for handling and protecting information assets while being accessed over a network.
- Disaster recovery and business continuity are procedures and actions put together to re-establish complete functionality after a critical cyber security event.
- End-user education addresses the concern of unpredictable cyber-security failure i.e. in an event where a user may introduce a virus due to failure of following good practices like avoiding attaching USB / Storage devices or downloading unverified attachments through mail etc.
The threats can be classified into the below categories
- Cybercrime includes single person or teams targeting systems for gain or to cause disruption.
- Cyber-attack often involves a politically intended military operation.
- Cyberterrorism is meant to undermine electronic systems to cause panic or concern.
Here are some common methods applied to invade cyber-security:
Which is a malicious software package that a cybercriminal or hacker has created to disrupt or harm a legitimate user’s laptop.
There are various kinds of malware, including:
- Virus: A self-replicating program that attaches itself to a file and spreads throughout a system, infecting files with malicious code.
- Trojans: are malwares that masquerade as a genuine software package which Cybercriminals fool users into uploading onto their laptops through which they cause harm or collect information.
- Spyware: is a type of program that on the sly records user activity enabling cyber criminals to misuse information collected such as credit card numbers etc.
- Ransomware: is a Malware that disables user access to their files and threatens to erase the files until the ransom is paid.
- Adware: Is an advertising software package which can be used to distribute malware.
- Botnets: groups of computers infected with malware used by cybercriminals to performs tasks online without the user’s permission.
Others threats include:
- Injection attacks (e.g., cross-site scripting, SQL injection, command injection)
- Session management and Man-in-the-Middle attacks
- Denial of service
- Privilege escalations
- Unpatched/Vulnerable software
- Remote code execution
- Brute force
Cyber security has become very important as our society gets more dependent on technology and sensitive information like credit cards, bank account details, intellectual property, government and industrial information are susceptible to theft as such information are being shared on could platforms. Hence it becomes inevitable that cyber security measures are put in place to check the leak of such sensitive information.
For cyber security to be efficient and effective across any organizations assets many systems have to work in perfect coordination and sync.
- Application Security: implies security for all organizational software’s & services.
- Identity Management and Data Security: deals with process and frameworks put in place to manages authorization and authentication of individuals & Data while are rest and in transit.
- Network Security: protects the organizational assets against external and internal threats through implementing hardware and software mechanisms that checks unauthorized access or misuse of an organizations network infrastructure.
- Mobile Security: helps protect personal & organizational information from in case of device loss, unauthorized access or malware attacks on mobile devices like cell phones, tablets & laptops.
- Cloud Security: deals with designing effective cybersecurity architecture and environment that can provide protection for organizations that use various cloud-based services like Google, AWS, etc.
- Disaster recovery and business continuity: planning deals with cybersecurity readiness that enables organizations to keep critical functions online and resume normal operations in case of a disaster or cyber threat incident.
- User education: it is important to share best practices and introduce individuals to cyber security raising their awareness about procedures and policies and about malicious content so they do not unknowingly jeopardise the security of their systems.
Here are a few tips how businesses and individuals can shield themselves from Cyber-attacks.
- Keep your system software updated i.e., makes your systems has the latest released security patches.
- Using a good antivirus software that’s can detect and remove threats and make sure you the software updated with latest patches for the best level of protection.
- It always good to have strong passwords that can’t be guessed easily and one should review and keep changing them after a while.
- No matter how tempted avoid opening mails or clicking on links in those mails from unknown senders as they might contain malware.
- Avoid using public, free, unsecure Wi-Fi at various places as these networks leave you exposed to man-in-the-middle attacks.
There are many examples of real-life experiences where financial organizations like banks and social organizations, weather channels etc. have faced cyber-attacks and have lost valuable information and resources. Though the internet and the information on it is free for you to consume but also lurks the danger of being susceptible to such cyber security lapses where you stand to lose
a lot. So we as responsible citizens should practice good cyber hygiene and be safe from such security breaches and try to control where we leave our digital footprints.