Document

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

Cyber Security, Types and Importance

Cyber Security is the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, theft, damage, modification or unauthorized
access. It’s also known as Information Security (INFOSEC), Information Assurance (IA), or
System Security.

Why Cybersecurity?
Cyber Security is important because the government, Corporate, medical organizations, collect
military, financial, process, and store the unprecedented amount of data on a computer and other
properties like personal information, and these private information exposure could have negative
consequences.

Cyber Security proper began in 1972 with a research project on ARPANET (The Advanced
Research Projects Agency Network), a precursor to the internet. ARPANET developed protocols
for remote computer networking. Example – If we shop from any online shopping website and
share information like email id, address, and credit card details as well as saved on that website
to enable a faster and hassle-free shopping experience, then the required information is stored on
a server one day we receive an email which state that the eligibility for a special discount
voucher from XXXXX (hacker use famous website Name like Flipkart, Amazon, etc.) website to
receive the coupon code, and we will be asked to fill the details then we will use saved card
account credentials. Then our data will be shared because we think it was just an account for the
verification step, then they can wipe a substantial amount of money from our account.

That is why Cyber Security provides services as a Security Gate-Way to make information more
Secure; in today’s time, hackers are advanced. We can’t surely say whether the data stored in my
Devices is safe from outside threats. With Cybercrime increasing rapidly, it’s crucial to have
Cyber Security in place in our personal life and our Business.

Types of Cybersecurity:
1. Network Security –
Focuses on securing computer networks from unauthorized access, data breaches, and other
network-based threats. It involves technologies such as Firewalls, Intrusion detection systems
(IDS), Virtual private networks (VPNs), and Network segmentation.
Guard your internal network against outside threats with increased network security.
Sometimes we used to utilize free Wi-Fi in public areas such as cafes, Malls, etc. With this
activity, 3rd Party starts tracking your Phone over the internet. If you are using any payment
gateway, then your bank account can be Empty.
So, avoid using Free Network because free network Doesn’t support Securities.
2. Application Security –
Concerned with securing software applications and preventing vulnerabilities that could be
exploited by attackers. It involves secure coding practices, regular software updates and patches,
and application-level firewalls.

Most of the Apps that we use on our Cell-phone are Secured and work under the rules and
regulations of the Google Play Store.
There are 3.553 million applications in Google Play, Apple App Store has 1.642 million, while
Amazon App Store has 483 million available for users to download. When we have other
choices, this does not mean that all apps are safe.
Many of the apps pretend to be safe, but after taking all information from us, the app share the
user information with the 3rd-party.
The app must be installed from a trust-worthy platform, not from some 3rd party website in the
form of APK (Android Application Package).
3. Information or Data Security:
Focuses on protecting sensitive information from unauthorized access, disclosure, alteration, or
destruction. It includes Encryption, Access controls, Data classification, and Data loss prevention
(DLP) measures.

Incident response refers to the process of detecting, analyzing, and responding to security
incidents promptly.
Promoting security awareness among users is essential for maintaining information security. It
involves educating individuals about common security risks, best practices for handling sensitive
information, and how to identify and respond to potential threats like phishing attacks or social
engineering attempts.
Encryption is the process of converting information into an unreadable format (ciphertext) to
protect it from unauthorized access.
4. Cloud Security –
It involves securing data, applications, and infrastructure hosted on cloud platforms, and
ensuring appropriate access controls, data protection, and compliance. It uses various cloud
service providers such as AWS, Azure, Google Cloud, etc., to ensure security against multiple
threats.

Cloud base data storage has become a popular option over the last decade. It enhances privacy
and saves data on the cloud, making it accessible from any device with proper authentication.
These platforms are free to some extent if we want to save more data than we have to pay.
AWS is also a new Technique that helps to run your business over the internet and provides
security to your data
5. Mobile Security –
It involves securing the organizational and personal data stored on mobile devices such as cell
phones, tablets, and other similar devices against various malicious threats. These threats are
Unauthorized access, Device loss or Theft, Malware, etc.

Mobile is the very common device for day to day work. Everything we access and do are from
mobile phone. Ex- Online class, Personal Calls, Online Banking, UPI Payments, etc.
Regularly backing up mobile device data is important to prevent data loss in case of theft,
damage, or device failure.
Mobile devices often connect to various networks, including public Wi-Fi, which can pose
security risks. It is important to use secure networks whenever possible, such as encrypted Wi-Fi
networks or cellular data connections.
6. Endpoint Security:
Refers to securing individual devices such as computers, laptops, smartphones, and IoT devices.
It includes antivirus software, intrusion prevention systems (IPS), device encryption, and regular
software updates.
Antivirus and Anti-malware software that scans and detects malicious software, such as Viruses,
Worms, Trojans, and Ransomware. These tools identify and eliminate or quarantine malicious
files, protecting the endpoint and the network from potential harm.
Firewalls are essential components of endpoint security. They monitor and control incoming and
outgoing network traffic, filtering out potentially malicious data packets.
Keeping software and operating systems up to date with the latest security patches and updates is
crucial for endpoint security.
5. Critical Infrastructure Security-
All of the physical and virtual resources, systems, and networks that are necessary for a society’s
economics, security, or any combination of the above to run smoothly are referred to as critical
infrastructure. Food and agricultural industries, as well as transportation systems, comprise
critical infrastructure.
The infrastructure that is considered important might vary depending on a country’s particular
demands, resources, and level of development, even though crucial infrastructure is comparable
across all nations due to basic living requirements.
Industrial control systems (ICS), such as supervisory control and data acquisition (SCADA)
systems, which are used to automate industrial operations in critical infrastructure industries, are
frequently included in critical infrastructure. SCADA and other industrial control system attacks
are very concerning. They have the capacity to seriously undermine critical infrastructure,
including transportation, the supply of oil and gas, electrical grids, water distribution, and
wastewater collection.
Due to the links and interdependence between infrastructure systems and sectors, the failure or
blackout of one or more functions could have an immediate, detrimental effect on a number of
sectors.
7. Internet of Things (IoT) Security-
Devices frequently run on old software, leaving them vulnerable to recently identified security
vulnerabilities. This is generally the result of connectivity problems or the requirement for end
users to manually download updates from a C&C center.
Manufacturers frequently ship Internet of Things (IoT) devices (such as home routers) with
easily crackable passwords, which may have been left in place by suppliers and end users. These
devices are easy targets for attackers using automated scripts for mass exploitation when they are
left exposed to remote access.
APIs are frequently the subject of threats such as Man in the Middle (MITM), code injections
(such as SQLI), and distributed denial of service (DDoS) attacks since they serve as a gateway to
a C&C center. You can read more about the effects of attacks that target APIs here.
Why is Cybersecurity Important?

Cybersecurity is essential for protecting our digital assets, including sensitive personal and
financial information, intellectual property, and critical infrastructure. Cyberattacks can have
serious consequences, including financial loss, reputational damage, and even physical harm.

Cyber security is vital in any organization, no matter how big or small the organization is. Due to
increasing technology and increasing software across various sectors like government, education,
hospitals, etc., information is becoming digital through wireless communication networks.
The importance of cyber security is to secure the data of various organizations like email, yahoo,
etc., which have extremely sensitive information that can cause damage to both us and our
reputation. Attackers target small and large companies and obtain their essential documents and
information.

Cybersecurity has become increasingly important in today’s interconnected world. As more and
more data is stored and transmitted electronically, the risk of cyber attacks has also increased.
Cybersecurity is the practice of protecting computer systems, networks, and data from theft,
damage, or unauthorized access.

Importance of Cybersecurity:
Protecting Sensitive Data:
With the increase in digitalization, data is becoming more and more valuable. Cybersecurity
helps protect sensitive data such as personal information, financial data, and intellectual
property from unauthorized access and theft.

Prevention of Cyber Attacks:


Cyber attacks, such as Malware infections, Ransomware, Phishing, and Distributed Denial of
Service (DDoS) attacks, can cause significant disruptions to businesses and individuals. Effective
cybersecurity measures help prevent these attacks, reducing the risk of data breaches, financial
losses, and operational disruptions.

Safeguarding Critical Infrastructure:


Critical infrastructure, including power grids, transportation systems, healthcare systems, and
communication networks, heavily relies on interconnected computer systems. Protecting these
systems from cyber threats is crucial to ensure the smooth functioning of essential services and
prevent potential disruptions that could impact public safety and national security.

Maintaining Business Continuity:


Cyber attacks can cause significant disruption to businesses, resulting in lost revenue, damage to
reputation, and in some cases, even shutting down the business. Cybersecurity helps ensure
business continuity by preventing or minimizing the impact of cyber attacks.

Compliance with Regulations:


Many industries are subject to strict regulations that require organizations to protect sensitive
data. Failure to comply with these regulations can result in significant fines and legal action.
Cybersecurity helps ensure compliance with regulations such as HIPAA, GDPR, and PCI DSS.

Protecting National Security:


Cyber attacks can be used to compromise national security by targeting critical infrastructure,
government systems, and military installations. Cybersecurity is critical for protecting national
security and preventing cyber warfare.

Preserving Privacy:
In an era where personal information is increasingly collected, stored, and shared digitally,
cybersecurity is crucial for preserving privacy. Protecting personal data from unauthorized
access, surveillance, and misuse helps maintain individuals’ privacy rights and fosters trust in
digital services.

Challenges of Cybersecurity:
Constantly Evolving Threat Landscape:
Cyber threats are constantly evolving, and attackers are becoming increasingly sophisticated.
This makes it challenging for cybersecurity professionals to keep up with the latest threats and
implement effective measures to protect against them.
Lack of Skilled Professionals:
There is a shortage of skilled cybersecurity professionals, which makes it difficult for
organizations to find and hire qualified staff to manage their cybersecurity programs.

Limited Budgets:
Cybersecurity can be expensive, and many organizations have limited budgets to allocate
towards cybersecurity initiatives. This can result in a lack of resources and infrastructure to
effectively protect against cyber threats.

Insider Threats:
Insider threats can be just as damaging as external threats. Employees or contractors who have
access to sensitive information can intentionally or unintentionally compromise data security.

Complexity of Technology:
With the rise of cloud computing, IoT, and other technologies, the complexity of IT infrastructure
has increased significantly. This complexity makes it challenging to identify and address
vulnerabilities and implement effective cybersecurity measures.

Strategies for Addressing Cybersecurity Challenges:


Comprehensive Risk Assessment:
A comprehensive risk assessment can help organizations identify potential vulnerabilities and
prioritize cybersecurity initiatives based on their impact and likelihood.

Cybersecurity Training and Awareness:


Cybersecurity training and awareness programs can help employees understand the risks and best
practices for protecting against cyber threats.

Collaboration and Information Sharing:


Collaboration and information sharing between organizations, industries, and government
agencies can help improve cybersecurity strategies and response to cyber threats.
Cybersecurity Automation:
Cybersecurity automation can help organizations identify and respond to threats in real-time,
reducing the risk of data breaches and other cyber attacks.

Continuous Monitoring:
Continuous monitoring of IT infrastructure and data can help identify potential threats and
vulnerabilities, allowing for proactive measures to be taken to prevent attacks.

How to Protect Yourself from Cyber Threats:


There are several steps you can take to protect yourself from cyber threats, including:

Use strong passwords: Use unique and complex passwords for all of your accounts, and consider
using a password manager to store and manage your passwords.
Keep your software up to date: Keep your operating system, software applications, and security
software up to date with the latest security patches and updates.
Enable two-factor authentication: Enable two-factor authentication on all of your accounts to add
an extra layer of security.
Be wary of suspicious emails: Be cautious of unsolicited emails, particularly those that ask for
personal or financial information or contain suspicious links or attachments.
Educate yourself: Stay informed about the latest cybersecurity threats and best practices by
reading cybersecurity blogs and attending cybersecurity training programs.
Conclusion: Cybersecurity is an essential part of our digital lives, protecting our personal and
professional assets from cyber threats. By understanding the types of cyber threats, taking
proactive steps to protect yourself, and staying informed about the latest best practices, you can
help ensure the safety and security of your digital assets.

Unlock the Power of Placement Preparation!


Feeling lost in OS, DBMS, CN, SQL, and DSA chaos? Our Complete Interview Preparation
Course is the ultimate guide to conquer placements. Trusted by over 100,000+ geeks, this course
is your roadmap to interview triumph.
Ready to dive in? Explore our Free Demo Content and join our Complete Interview Preparation
course.

Last Updated : 11 May, 2023

32

Previous
Difference between Block Cipher and Transposition Cipher
Next
Data encryption standard (DES) | Set 1
Share your thoughts in the comments

Add Your Comment


Similar Reads
Cyber Security and Cyber Crimes
Difference between Cyber Security and Information Security
Difference between Network Security and Cyber Security
How Security System Should Evolve to Handle Cyber Security Threats and Vulnerabilities?
Difference between Software Security and Cyber Security
Cyber Security – Types of Enumeration
Difference Between Zombie and Logic Bomb in Cyber Security
Information Security and Cyber Laws
Cyber Security – Attacking through Command and Control
Difference between Client side filter and Server side filters in Cyber Security
P

Prateektyagibca2018
Article Tags :
Cyber-security
Computer Networks
School Learning
Geeksforgeeks-footer-logo
A-143, 9th Floor, Sovereign Corporate Tower, Sector-136, Noida, Uttar Pradesh – 201305
GFG App on Play Store
GFG App on App Store
Company
About Us
Legal
Careers
In Media
Contact Us
Advertise with us
GFG Corporate Solution
Placement Training Program
Explore
Hack-A-Thons
GfG Weekly Contest
DSA in JAVA/C++
Master System Design
Master CP
GeeksforGeeks Videos
Geeks Community
Languages
Python
Java
C++
PHP
GoLang
SQL
R Language
Android Tutorial
Tutorials Archive
DSA
Data Structures
Algorithms
DSA for Beginners
Basic DSA Problems
DSA Roadmap
Top 100 DSA Interview Problems
DSA Roadmap by Sandeep Jain
All Cheat Sheets
Data Science & ML
Data Science With Python
Data Science For Beginner
Machine Learning Tutorial
ML Maths
Data Visualisation Tutorial
Pandas Tutorial
NumPy Tutorial
NLP Tutorial
Deep Learning Tutorial
HTML & CSS
HTML
CSS
Web Templates
CSS Frameworks
Bootstrap
Tailwind CSS
SASS
LESS
Web Design
Django Tutorial
Python Tutorial
Python Programming Examples
Python Projects
Python Tkinter
Web Scraping
OpenCV Tutorial
Python Interview Question
Computer Science
Operating Systems
Computer Network
Database Management System
Software Engineering
Digital Logic Design
Engineering Maths
DevOps
Git
AWS
Docker
Kubernetes
Azure
GCP
DevOps Roadmap
Competitive Programming
Top DS or Algo for CP
Top 50 Tree
Top 50 Graph
Top 50 Array
Top 50 String
Top 50 DP
Top 15 Websites for CP
System Design
High Level Design
Low Level Design
UML Diagrams
Interview Guide
Design Patterns
OOAD
System Design Bootcamp
Interview Questions
JavaScript
JavaScript Examples
TypeScript
ReactJS
NextJS
AngularJS
NodeJS
Lodash
Web Browser
Preparation Corner
Company-Wise Recruitment Process
Resume Templates
Aptitude Preparation
Puzzles
Company-Wise Preparation
School Subjects
Mathematics
Phy

You might also like