By cywhisper
Cyber talk
on
- Get link
- X
- Other Apps
What is the first thing that comes to mind when you hear cybersecurity? what is cyber? what is security in this aspect? Well, let's dive into it.
what is cyber?
when you think about the virtual world, digital technology, and computer networks. yes! that is cyber. it comes as a new word from the term cybernetics which is derived from the Greek word kubernetes.
how about security?
security simply means safeguarding, protection from harm and threat, prevention, keeping safe and the list goes on.
Joining these two words together, cybersecurity is the practice or aspect of defending or protecting digital technology, systems, networks, programs, and the data they contain from cyber threats and attacks.
The main purpose is to prevent cybercriminals and even malicious insiders from causing harm to the system.
There are different types of cybersecurity, based on what the technology is to protect.
1, NETWORK SECURITY: it is the policies and technology put in place to focus on protecting the computer network and data from unauthorized access, misuse, or breaches. These include intrusion detection systems, virtual private networks, and other security measures.
2, APPLICATION SECURITY: These are the processes and tools put in place to identify data breaches and secure the software application from theft and also compromise the CIA (confidentiality, integrity, and availability)of the data.
3, ENDPOINT SECURITY: It is the protection of devices such as the server and other individual devices from cyberattacks and security threats. Some ways of protection are the use of antivirus, firewalls, etc.
4, CLOUD SECURITY: The cloud is a server that is accessed over the internet. Cloud security is procedures and technology put in place to prevent and secure the cloud data from attacks.
5, DATA SECURITY: It is the safeguarding of digital information and ensuring the confidentiality, integrity, and availability of the data for unauthorized users or access.
THREAT IN CYBERSECURITY.
These are the malicious activities that cause harm to both the hardware and software. It targets individuals, organizations, and even nations. Here are some:
1, MALWARE: This is malicious software that is designed to cause harm to data and hardware and even allow unauthorized entry into the system. some poses has friendly legitimate, some destroys immediately and some do not even show they exist. examples are; viruses, worms, trojans, spywares, key loggers, etc.
2, SOCIAL ENGINEERING: This is a technique used to deceive or manipulate individuals into releasing confidential information. These include phishing, pretexting, tailgating, quid pro quo ( giving something of importance in exchange for information), and more.
3, DENIAL OF SERVICE (DOS): It is the overloading of the victim system with a large volume of traffic preventing access to legitimate users. it causes service disruption and affects business operations.
4, PHISHING: It is part of the social engineering attack tricks that involve deceiving individuals to release sensitive information by posing as legitimate through fraudulent emails, messages, and even websites that appear to be real.
5, INSIDER THREAT: This can be intentional or not, it is the misuse of access privilege to steal data and commit many illegal activities, and it is done by employees within the organization.
SAFETY TIPS TO ENSURE SAFETY.
1, Use of a strong password.
2, Carefully read emails.
3, Enable 2FA (two-factor authentication).
4, Secure internet connection.
5, Be informed of the latest news and upgrades.
6, Regularly update your devices.
7, Back up data regularly.
8, Make use of secured connections.
9, Be careful with what you share on social media.
10, Be cautious of the website you enter.
In conclusion,
Knowing all of this is different from putting them in place, and making use of all safety tips to prevent attacks, cybersecurity is not 100 percent efficient because new vulnerabilities are found every day, and your device with no security is an easy target.
NOTE: everyone can be a victim.
thank you for reading
Comments