What is Cyber Security ?
Ezzddine Mhamdi
Junior DevOps Engineer at @CodinCloud | Cloud Engineering Student | Cybersecurity & DevSecOps Enthusiast | Python & Golang Developer
Introduction
The protection of internet-connected systems such as computers, laptops, mobile phones, etc., is done by cybersecurity from the malicious attacks. Here are two parts of cybersecurity which are cyber and security.?
Cybersecurity is also called?electronic information security?or?information technology security.
Types of Cybersecurity
The assets of every firm are made up of a range of distinct systems. These systems have a strong cybersecurity posture, requiring coordinated efforts across all platforms. As a result, we may divide cybersecurity into the following sub-domains:
Network Security
It entails putting in place the technology and software necessary to protect a computer network against unauthorized access, intruders, assaults, interruption, and abuse. This security aids an organization in safeguarding its assets against both external and internal threats.
Application Security
It entails safeguarding software and equipment against malicious attacks. For ensuring whether the apps are secured from cyber attacks, we constantly update our app. Before deploying a program or device, successful security begins with the design stage, which includes authoring source code, validation, threat modeling, and so on.
Information or Data Security
To maintain the integrity and privacy of data, both in storage and in transit, implementing a robust data storage mechanism is involved.
Identity management
It is concerned with the technique for identifying each individual's level of access inside an organization.
Operational Security
This type of cybersecurity involves processing and decision-making on securing and handling data assets.
User Education
It is concerned with the protocols, monitoring, alarms, and strategies that an organization employs when hostile behavior causes operations or data loss. Its policies require it to resume lost activities at the same operational capacity as before the accident.
Mobile Security
Security of the personal and organizational data present in the mobile phone, tablets, computers, and other similar devices against various malicious threats is involved here. These threats can be unauthorized access, malware or device loss, theft, etc.
Cloud Security
Protection of the data present in the cloud environment for the organization is involved here. For this purpose, we use many cloud service providers like AZURE, Google, etc.
Disaster Recovery and Business Continuity Planning
It covers the protocols, monitoring, alarms, and plans that an organization uses to respond when hostile behavior disrupts operations or data. Its policies call for recovering lost operations at the same operating capacity as before any accident.
Importance of cybersecurity
In this digital era, we live where the network, computer and other electronic devices, and software programs have a role in every part of our lives. The banking system, healthcare, financial institutions, governments, and manufacturing industries are critical infrastructures dependent on networks, and use devices that are a core part of their operations are connected to the Internet. There are many information in these infrastructures, such as bank details, financial data, and personal data, which can be sensitive for exposure that could have negative consequences or unauthorized access. For monetary gains, political, or social motives, these unauthorized people can use this information.
Cyber-attacks, which compromise the system, are now a global problem, potentially jeopardizing the global economy. Therefore an excellent cybersecurity strategy is essential to protect sensitive data from high-profile security breaches. Furthermore, considering the growth of cyberattacks, companies and organizations, particularly those dealing with sensitive business and personal information connected to national security, health, or financial records, must employ robust cybersecurity procedures and processes to secure their sensitive business and personal information.
Goals of cybersecurity
Data protection is the main objective of cybersecurity. The security sector offers a triangle of three related concepts to safeguard data from cyber-attacks. The CIA trio is the name given to this approach. The CIA model is intended to serve as a framework for rules governing an organization's information security infrastructure. When security breaches are discovered, one or more of these principles has been violated.
The CIA model is divided into?Confidentiality, Integrity, and Availability.
Types of cybersecurity threats
Cyber-security counters three types of threats:
1.?Cybercrime:?It encompasses both single actors and groups who attack systems for monetary gain or to create damage.
2.?Cyber-attacks:?Politically motivated information collection is frequently used in cyber-attacks.
3.?Cyberterrorism?aims to disrupt electronic systems to generate panic or fear.
?
So how can hostile actors obtain access to computer systems? Here are some common strategies for jeopardizing cyber-security:
Malware?
Malware refers to malicious software, the most popular type of cyber assault instrument. It is utilized by a cybercriminal or hacker to disrupt or harm the system of a legitimate user. Below given are the most common forms of malware developed by the hacker:
SQL injection
SQL (Structured Language Query) injection is a cyber-attack used to gain access to and steal data from a database. Cybercriminals exploit weaknesses in data-driven applications to malicious implant malware into a database using a fraudulent SQL query. This allows them access to the database's sensitive information.
Phishing
Phishing occurs when fraudsters send emails that look to be from a reputable firm and request sensitive information from victims. Phishing attacks are frequently used to trick consumers into providing credit card details and other sensitive information.
The man-in-the-middle attack
A man-in-the-middle attack is a cyber threat in which a cybercriminal intercepts communication between two people to steal information. For example, on an insecure WiFi network, an attacker may intercept data passing between the victim's device and the web.
The denial-of-service attack
A denial-of-service attack occurs when fraudsters overload networks and servers with traffic to prevent a computer system from delivering legitimate requests. This results in rendering the system inoperable and prevents an organization from performing critical operations.