Article 4: What is Cyber-Security?

 Cyber-Security

Cyber-Security is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or removing important information; extorting money from users via ransomware; or interrupting normal business processes.

Types of Cyber-Security

The five types of Cyber-Security are as follows:
  • Application Security
  • Network Security
  • Cloud Security
  • Critical Infrastructure Security
  • IoT (Internet of Things) Security
1. Application Security

Application Security is the process of devloping, adding, testing security features within applications to prevent security vulnearabilities against ransomware or threats such as unauthorized access and modification.

2. Network Security

Network Security is the protecting of the underlying networking infrasrtucture from unauthorized access, misuse, or theft. It involves creating a secure infrastructure for devices, applications, and users to work in a secure manner.

3. Cloud Security

Cloud security, also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data. These measures ensure user and device authentication, data and resource access control, and data privacy protection.

4. Critical Infrastructure Security

Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public's health and/or safety.

5. IoT (Internet of Things) Security

Internet of Things (IoT) devices are computerized Internet-connected objects, such as networked security cameras, smart refrigerators, and WiFi-capable automobiles. IoT security is the process of securing these devices and ensuring they do not introduce threats into a network.

Summary

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. 

*************END OF ARTICLE 4*************

Comments

Post a Comment

Popular posts from this blog

Article 1: What is Information Technology?

Article 3: What are Electronic Devices?

Article 2: Is I.T. that important?