***Welcome to ashrafedu.blogspot.com * * * This website is maintained by ASHRAF***

Posts

    Latest Updates

    Sunday, April 24, 2022

    Cyber Security

    "Cyber security is primarily about people, processes, and technologies working together to encompass the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, etc."

    Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

    Cyber security is the protection of Internet-connected systems, including hardware, software, and data from cyber attacks.

    It is made up of two words one is cyber and other is security.

             Cyber is related to the technology which contains systems, network and programs or data.

             Whereas security related to the protection which includes systems security, network security and application and information security.

    Listed below are the reasons for importance of cyber security:

             Cyber attacks can be extremely expensive for businesses to endure.

             In addition to financial damage suffered by the business, a data breach can also inflict untold reputational damage.

             Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using more sophisticated ways to initiate cyber attacks.

    Cyber security Fundamentals –

    Confidentiality:

    Confidentiality is about preventing the disclosure of data to unauthorized parties.

    It also means trying to keep the identity of authorized parties involved in sharing and holding data private and anonymous.

    Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle (MITM) attacks, disclosing sensitive data.

    Standard measures to establish confidentiality include:

             Data encryption

             Two-factor authentication

             Biometric verification

             Security tokens

    Integrity

    Integrity refers to protecting information from being modified by unauthorized parties.

    Standard measures to guarantee integrity include:

             Cryptographic checksums

             Using file permissions

             Uninterrupted power supplies

             Data backups

    Availability

    Availability is making sure that authorized parties are able to access the information when needed.

    Standard measures to guarantee availability include:

             Backing up data to external drives

             Implementing firewalls

             Having backup power supplies

             Data redundancy 

     OObjectives of Cyber Security:

    1. Building an efficient and secure system

    2. Improving security of the system by improving its regulatory frame work.

    3. To make the services and products of ICT (information and communication technologies) more visible with use of security validation and testing.

    4. To facilitate organizations for employing standard security practices.

    5. To provide protection to the private information of the individuals.

    6. Improvising various laws for illegal activities involving cyber crimes.

    7. To improve cooperation among public and private partnership regarding cyber security. 


    No comments:

    Post a Comment

    Network session analysis

    Network session analysis Network session analysis is a method of monitoring network activity and availability to identify issues, such as ...