Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. It is also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing and can be divided into a few common categories like network security, application security, information security and operational security.

Network Security

It is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

Application Security

It focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stste, well before a program or device is deployed.

Information Security

It protects the integrity and privacy of data, both in storage and intransit.

Operational Security

It includes the processes and decisions for handling and protecting data assets.

Why is Cyber Security Important?

With an increasing number of users, devices and programs in the modern enterprise, combined with the increased deluge of data -- much of which is sensitive or confidential. -- the importance of cybersecurity continue to grow. The growing volume and sophistication of cyber attackers and attack techniques compound the problem even further.

Major Breaches

  • Yahoo Breach in 2013
  • WannaCry Ransomeware in 2017
  • eBay in 2014
  • Heartbleed from 2012-2014

Types of Cyber Security Threats

  1. Malware: It is a form of malicious software in which any file or program can be used to harm a computer user. This includes worms, viruses, trojans and spyware.
  2. Ransomware: It is another type of malware. It involves an attacker locking the victim's computer system files -- typically encryption and demanding a payment to decrypt and unlock them.
  3. Social Engineering: It is an attack that relies on human interaction to trick users into breaking security procedures to gain sensitive information that is typically protected.
  4. Phishing: It is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data such as credit card or login information.
  5. Insider Attacks: These are security breaches or losses caused by humans for example, employees, contractors or customers. Insider threats can be malicious or negligent in nature.
  6. Distributed Denial of Service (DDoS) Attacks: These attacks are those attacks in which multiple systems disrupt the traffic of a targeted system such as as server, website or other network resource. By flooding the target with messages, connection request or packets, the attackers can slow the system or crash it, preventing legitimate traffic from using it.
  7. Man-in-the-Middle Attacks: These attacks are eavesdropping attacks that involve an attacker intercepting and relaying messages between two parties who believe they are communicating with each other.

Cyber Security Tips

  • Update your software and operating system
  • Use anti-virus software
  • Use strong passwords
  • Do not open email attachments from unknown senders
  • Avoid using unsecure WIFI networks in public places.

One Reply to “Cyber Security”

Leave a Reply

Your email address will not be published. Required fields are marked *