Cyber Security

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Cyber Security

The practise of protecting computers, servers, mobile devices, electronic


systems, networks, and data from malicious attacks is known as cyber security.
It's also known as electronic information security or information technology
security. The word is used in a number of situations, ranging from business to
mobile computing, and it may be broken down into a few categories.
The practise of securing a computer network from intruders, whether targeted
attackers or opportunistic malware, is known as network security.
The goal of application security is to keep software and devices safe against
attacks. A hacked programme might provide access to the data it was
supposed to safeguard. Security starts throughout the design phase, long
before a program or device is deployed.
Data integrity and privacy are protected by information security, both in
storage and in transport.
The methods and decisions for handling and securing digital assets are
included in operational security. The processes that define how and where
data may be kept or exchanged, as well as the rights users have while
accessing a network, all fall under this umbrella.
Disaster recovery and business continuity are terms used to describe how a
company reacts in the case of a cyber-security breach or any other catastrophe
that results in the loss of operations or data. Disaster recovery policies
describe how an organization restores activities and information to the same
level as before the disaster. Business continuity is the strategy that an
organization uses when it is unable to operate due to a lack of resources.
End-user education tackles the most unpredictably unpredictable aspect of
cyber-security: humans. By failing to follow proper security procedures,
anybody might unintentionally introduce a virus into an otherwise protected
system. It is critical for every organization's security to teach people to delete
suspicious email attachments, not plug in unfamiliar USB devices, and a variety
of other crucial teachings.

You might also like