Cyber Security Series
📌 Cyber Security
Cybersecurity is a defensive method to defend devices and services from cyber-attacks/cyber criminals and ensure the data integrity/confidentiality/availability is maintained. Today the complete World is having data stored across the globe (Cloud/Data centers) and with the emerging trend of cyber-attacks around the world every organization must maintain data security and privacy through a strong defensive security model.
📌 How Cyber security helps?
• Security to safeguard the computing environment
• Ensuring strong controls and security is implemented across the environment
• Protection of computer resources and data from theft/damage/attacks from external or unauthorized sources
• Protecting the network from digital attacks that aims to destroy the system and its information
📌 How Does Cyber Security Work? The Challenges of Cyber Security
Cyber security works in a series of subdomains within Security – like Application Security, Cloud Security /Identity Management and Data Security/Mobile Security/Network Security/Disaster Recovery and Business Continuity Planning. Each of these is segregated to maintain the security measures within its limit, and ensure strong and robust security is implemented to make it the attackers impossible to initiate the attack.
📌 Types of Cyber Threats (Listed some but not limited to)
• Malware attack
• SQL injection
• Man in The Middle (MITM) attack
• Denial Of Service (DOS) attack
• Crypto jacking
• Social engineering
📌Different Domains in Cyber security?
Access control systems & methodologies – dealing with the protection of systems and it's resources from unauthorized access. Ex: MFA, SSO etc
Telecommunication and Network Security – dealing with network communications, protocols, services, and threats/vulnerabilities associated with those services.
Security Management practices – dealing and managing the systems against system failures, cyber-attacks, natural disasters, and other interruptions to the services.
Security Architecture and Engineering -Policies and Procedures to facilitate Security controls and involves in policy planning for every type of security issues.
Law, Investigation and Ethics -Legal issues associated with security of the system, such as dealing with cyber-attacks is dealt in this domain
Application and system development security - Security during the application development and database security models and implementation of security during the testing and development phase including code security etc.
Cryptography – helps to understand how, when, and what encryptions to be used and covers various types of encryption and logic behind the same.
Computer operations security – day-to-day security operations on computers. Preventing malware attacks/incidents reported.
Physical security – deals with Physical access to the computer resources servers, workstations etc.
📌How Does Cyber Security Work? The Challenges of Cyber Security
Cyber security works in a series of subdomains within Security – like Application Security, Cloud Security /Identity Management Data Security/Mobile Security/Network Security/Disaster Recovery and Business Continuity Planning. Each of these is segregated to maintain the security measures within its limit and ensure robust security implemented to make attackers impossible to initiate the attack.
Happy learning folks 🙂
Community and Social Footprints :
Did you find this article valuable?
Support Cloudnloud Tech Community by becoming a sponsor. Any amount is appreciated!