Article 4: What is Cyber-Security?
Cyber-Security
Cyber-Security is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or removing important information; extorting money from users via ransomware; or interrupting normal business processes.
Types of Cyber-Security
The five types of Cyber-Security are as follows:
- Application Security
- Network Security
- Cloud Security
- Critical Infrastructure Security
- IoT (Internet of Things) Security
1. Application Security
Application Security is the process of devloping, adding, testing security features within applications to prevent security vulnearabilities against ransomware or threats such as unauthorized access and modification.
2. Network Security
Network Security is the protecting of the underlying networking infrasrtucture from unauthorized access, misuse, or theft. It involves creating a secure infrastructure for devices, applications, and users to work in a secure manner.
3. Cloud Security
Cloud security, also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data. These measures ensure user and device authentication, data and resource access control, and data privacy protection.
4. Critical Infrastructure Security
Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public's health and/or safety.
5. IoT (Internet of Things) Security
Internet of Things (IoT) devices are computerized Internet-connected objects, such as networked security cameras, smart refrigerators, and WiFi-capable automobiles. IoT security is the process of securing these devices and ensuring they do not introduce threats into a network.
Summary
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.
*************END OF ARTICLE 4*************
BRUH!
ReplyDeletecool
ReplyDeleteso awesome
ReplyDelete