Cybersecurity

Cybersecurity


 Cybersecurity is practice of protecting system network and program from digital attacks. These attacks are usually aimed at accessing, changing or destroying sensitive information. Extorting money from user or interupting normal business process.



Cybersecurity






How does cybersecurity work?

A successful cybersecurity approach has multiple layer of protection spread across computer network, program or data that one intends to keep safe.  


       In an organisation the People, Process and technology must all complement one another to create an effective defence from cyber attack.

•People 

User must understand and comply with basic data security principle like choosing strong password, being wary of attachment in emails and backing up data.

•Processes 

Organisation must have framework for how they deal with both attempt and successful cyberattacks. One well respected framework can guide you. It explain how you can identify attacks, protect system, detect and respond to threat, and recover from succesful attack. 

•Technology 

Technology is essential to giving organization and individual the computer security tools need to protect themselves from cyberattacks.


Three main entities must be protected :

• End point device : computer, smart devices and router. 

• Networks 

• Clouds 

Common technology used to protect these entities include next generation firewalls, DNS filtering, malware protection, antivirus software and email security solutions.


Why is cybersecurity important?

In today's connected world, everyone benefits from advanced cyber defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.

Everyone also benefits from the work of cyber threat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber-attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open source tools. Their work makes the Internet safer for everyone.

Types of cybersecurity threats

Ransomware

Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.

Ransomware attack


Malware

Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.

Malware


Social engineering

Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.




Social engineering

Phishing

Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It's the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails.


Phishing attack



1 Comments

  1. Nice Article.. Thankyou for sharing this great article. https://www.shriramcomputers2001.com/

    ReplyDelete

Post a Comment

Previous Post Next Post