What is Cyber Security??
Computer Security or Cyber Security or Information Technology is the practice of protecting Computers, Mobiles, Servers and other electronic devices from malicious attacks that are damaging their hardware, software or electronic data, as well as disruption of the services.
Importance of Cyber Security
In today’s connected world, it is very essential to protect ourselves from cyberthreats like protecting our digital assets, data and defending against growing threats which may cause the loss of intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.
Types of Cyberthreats
Phishing – is the practice of sending fraudulent emails that resemble emails from reputable sources, that is used to steal sensitive data like credit card numbers and login information.
Ransomeware – is a type of malware that is designed to extort money by blocking the access to files or servers until the ransom is paid and even after paying a ransom it is not guaranteed that you can restore all the data.
Malware – is a malicious software designed by hackers used to disrupt or damage a legitimate user’s computer.
SQL injection – Structured Language Query injection is a type of cyber attack used to take control and steal the sensitive information from the database
Challenges of Cyber Security
Network Security – is the practice of securing a computer network from intruders, whether targeted attackers or opurtunist malware.
Application security – Apps require constant updates and testing to ensure these programs are secure from attacks.
Information security – protects the integrity and privacy of data, both in storage and in transit.
Endpoint security – Remote access is a necessary part of business, but can also be a weak point for data.
Data Security – Inside of networks and applications is data. Protecting company and customer information is a separate layer of security.
Operational security – includes the processes and decisions for handling and protecting data assets.
Cloud security – Many files are in digital environments or “the cloud”. Protecting data in a 100% online environment presents a large amount of challenges.
Mobile security – Cell phones and tablets involve virtually every type of security challenge in and of themselves.
Disaster recovery and business continuity – define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.
End-user education – it is the most unpredictable cyber-security factor where people accidentally introduce a virus to an other secured system by failing to follow good security practices
Protect yourself against cyberattacks
- Update your software and operating system
2. Use anti-virus software
3. Use strong passwords
4. Do not open email attachments from unknown senders
5. Do not click on links in emails from unknown senders or unfamiliar websites
6. Avoid using unsecure WiFi networks in public places