Introduction to Cyber Security


 The Internet is the most popular and innovative creation within the world of technology is the Internet. The web is that the place where all types of data are present and even the communication process is feasible using the web. The planet has now become internet dependent due to its vast advantages.  In today's world internet is a daily need of everyone living being.As of January 2021 it is recorded that around 4.26 billion people use internet worldwide.

 Cyber Security is the protection of computer systems ,networks and other data from information disclosure ,theft and misuse . The growth in the number of computer systems and the increasing reliance upon them by individuals, businesses, industries, and governments means that there is an increasing number of systems at risk. There are many bad guys who can use this information for there own use

To protect this information from misuse many security measures are taken by the companies and also by the government organizations too.

This field is very large and it consist of many security aspects like :-

  Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

·        Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed.

·        Information security protects the integrity and privacy of data, both in storage and in transit.

·        Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.

·        Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.

·        End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any .

ifs I hope you learned something about cyber security and in this blog we will be going to learn about cyber security ,programming and also networking too .

 

Comments