Friday 27 September 2019

What Is Cyber Security?



    
                     


       Also known as information security, cyber security refers to the practice of ensuring the integrity, confidentiality and availability (ICA) of information. Cybersecurity is comprised of an evolving set of tools, risk management approaches, technologies, training, and best practices designed to protect networks, devices, programs, and data from attack or unauthorized access.

Why is Cyber security Important?
      The world trusts technology more than ever. As a result, digital data creation has increased. Today, companies and governments store a large amount of this data on computers and transmit it over their networks to other computers. Devices and their underlying systems have vulnerabilities that, when exploited, compromise the health and goals of an organization.
      A data breach can have a number of devastating consequences for any business. It can unravel a company's reputation by losing consumer and partner trust. The loss of critical data, such as source files or intellectual property, can cost the company its competitive advantage. Going further, a data breach can affect corporate revenues due to non-compliance with data protection regulations. On average, a data breach is estimated to cost an affected organization $ 3.6 million. With high profile data breaches that make headlines, it is essential for organizations to adopt and implement a strong cybersecurity approach.

Common Types of Cyber security
Network Security: protects network traffic by controlling inbound and outbound connections to prevent threats from entering or spreading on the network.
Data Loss Prevention (DLP): protects data by focusing on the location, classification, and monitoring of information at rest, in use, and on the go.
Cloud Security: provides protection for data used in cloud-based services and applications.

Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS): work to identify potentially hostile cyber activities.

Identity and Access Management (IAM) use: authentication services to limit and track employee access to protect internal systems from malicious entities.

Encryption is the process of encoding data to make it unintelligible and is generally used during data transfer to prevent theft in transit.

Antivirus / anti-malware: solutions scan computer systems for known threats. Modern solutions are capable of detecting previously unknown threats based on their behavior.

Common Types of Cyber Threats

Malware - Malicious software such as computer viruses, spyware, Trojans, and key registrars.
Ransom goods - malware that blocks or encrypts data until a ransom is paid.
Phishing Attacks - The practice of obtaining sensitive information (for example, passwords, and credit card information) through an email, phone call, or disguised text message.
Social Engineering - The psychological manipulation of individuals to obtain confidential information; usually overlaps with phishing.

Advanced Persistent Threat - Attack in which an unauthorized user gains access to a system or network and remains undetected for a long time.

Cyber security is Constantly Evolving

     Traditional cybersecurity revolves around the implementation of defensive measures around a defined perimeter. Recent activation initiatives, such as remote workers and BYOD (Bring Your Own Device) strategies, have dissolved the perimeter, reduced visibility on e-business and expanded the attack surface.
Today, the gaps are increasing rapidly, despite record levels of security spending. Global organizations are turning to human-centric cybersecurity, a new approach focused on changing user behavior rather than an exponential number of growing threats. Based on behavioral analysis, human-centric cybersecurity provides information about how an end user interacts with data and extends security controls to all systems hosting data, even if they are not controlled exclusively by the company. Ultimately, this approach is designed to identify behavioral anomalies in order to identify and prioritize the most serious threats, reducing the time needed for investigation and detection of threats.
This article was originally published on.....read more