"Cyber security is primarily about people, processes, and technologies working together to encompass the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, etc."
Cyber security is the
body of technologies, processes, and practices designed to protect networks,
computers, programs and data from attack, damage or unauthorized access.
Cyber security is the
protection of Internet-connected systems, including hardware, software, and
data from cyber attacks.
It is made up of two
words one is cyber and other is security.
•
Cyber is related to the technology which
contains systems, network and programs or data.
•
Whereas security related to the
protection which includes systems security, network security and application
and information security.
Listed below are the
reasons for importance of cyber security:
•
Cyber attacks can be extremely expensive
for businesses to endure.
•
In addition to financial damage suffered
by the business, a data breach can also inflict untold reputational damage.
•
Cyber-attacks these days are becoming
progressively destructive. Cybercriminals are using more sophisticated ways to
initiate cyber attacks.
Cyber security
Fundamentals –
Confidentiality:
Confidentiality is
about preventing the disclosure of data to unauthorized parties.
It also means trying to
keep the identity of authorized parties involved in sharing and holding data
private and anonymous.
Often confidentiality
is compromised by cracking poorly encrypted data, Man-in-the-middle (MITM)
attacks, disclosing sensitive data.
Standard measures to
establish confidentiality include:
•
Data encryption
•
Two-factor authentication
•
Biometric verification
• Security tokens
Integrity
Integrity refers to
protecting information from being modified by unauthorized parties.
Standard measures to
guarantee integrity include:
•
Cryptographic checksums
•
Using file permissions
•
Uninterrupted power supplies
•
Data backups
Availability
Availability is making
sure that authorized parties are able to access the information when needed.
Standard measures to
guarantee availability include:
•
Backing up data to external drives
•
Implementing firewalls
•
Having backup power supplies
•
Data redundancy
1. Building an
efficient and secure system
2. Improving
security of the system by improving its regulatory frame work.
3. To make the
services and products of ICT (information and communication technologies) more
visible with use of security validation and testing.
4. To facilitate
organizations for employing standard security practices.
5. To provide
protection to the private information of the individuals.
6. Improvising
various laws for illegal activities involving cyber crimes.
7. To improve
cooperation among public and private partnership regarding cyber security.
No comments:
Post a Comment