INTRODUCTION TO CYBER SECURITY



A computer hacker is the name given to the tech- folks on both sides of the internet battlefront. Bad guys or “black hat” hackers are the ones trying to break into computer systems, steal data, and install harmful software. The “white hat” hackers are cyber security heroes that develop ways to catch bad guys and stop malicious programs from doing damage. That’s interesting nomenclature, right?

The world of cyber security helps us to understand the dangers and how to protect ourselves from black hats of the world. Lets learn the proper  definition of cyber security. Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization. 

 

FACTORS AFFECTING CYBER SECURITY:

  • ·         Human factors: Technology impact, human error, modified MARC.

 

  • ·         Behavioral cyber security: offenders, targets, defenders, motives, crime theories.

 

  • ·         Modeling and simulation: models for anomaly detection.

 

CYBER SECURITY DOMAINS:

Critical infrastructure security

Network security

Application security

Cloud security

End-user education

Disaster recovery

 

AUTOMATION IN CYBER SECURITY:

Automation has become an integral component to keep companies protected from the growing number and sophistication of cyberthreats. Using artificial intelligence (AI) and machine learning in areas with high-volume data streams can help improve cybersecurity in three main categories:

 

  1.   Threat detection.: AI platforms can analyze data and recognize known threats, as well as predict novel threats.

     2     Threat response:  AI platforms also create and automatically enact security protections.

      3     Human augmentation. : Security pros are often overloaded with alerts and repetitive tasks. AI can help eliminate alert fatigue by automatically triaging low-risk alarms and automating big data analysis and other repetitive tasks, freeing humans for more sophisticated tasks.

 

Although cybersecurity professionals work hard to close security gaps, attackers are always looking for new ways to escape IT notice and exploit emerging weaknesses.Lets see some common cyber threats.

1. MALWARE: The term “malware” refers to malicious software variants—such as worms, viruses, Trojans, and spyware—that provide unauthorized access or cause damage to a computer.


2. RANSOMWARE: Ransomware is a type of malware that locks down files, data or systems, and threatens to erase or destroy the data - or make private or sensitive data to the public 


3. DDoS:  A DDoS attack attempts to crash a server, website or network by overloading it with traffic, usually from multiple coordinated systems


4. APT: In an APT, an intruder or group of intruders infiltrate a system and remain undetected for an extended period.

     Cybersecurity and the protection of privacy is extremely important. Across the world criminals are constantly trying to gain access to accounts and steal our data. Dangerous malicious software is just one click away. However, there are a lot of simple things you can do to keep yourself secure online. 

Keep your passwords secure.

Be vigilant, and don’t click on phishing email links, or open suspect attachments.

Be careful where you go online, and be wary of ‘free’ software.

Protect your devices.

Be cautious in your use of third-party online tools.


     Businesses today are connected like never before. Your systems, users and data all live and operate in different environments. Perimeter-based security is no longer adequate but implementing security controls within each environment creates complexity. ”True cyber security is preparing for what’s next, not what was last”


      Keep exploring… Thanks for reading !!..Hope you liked this blog, share your thoughts and stay engaged for more blogs.


Comments

Popular posts from this blog

MULTIMEDIA

Exploring The Hidden Internet

SKINPUT TECHNOLOGY