CYBER SECURITY

 

                           ELECTRONIC INFORMATION SECURITY


                                    As you all know nowadays it is the era of media, internet and its all about digital things. There is no place in which anyone don't use the computer and internet now it became everyone's need and everyone is using it for their own jobs businesses and other works. Hospitals, schools, colleges and many other organizations are using computer and internet connection and have contact between each others our globe is now became a global village. Everyone can talk and see each other by living many and many distance far away. We can stay informed each and every minute of all cases happening around the globe. For example if we are sitting in or house in city named New York we can see in the TV that in other city named Los Angeles what's happening or what is the breaking news in the LA. Its really amazing and have many benefits like saving time and get entertainment etc. In internet there are billions of users and every one have their own private material on the internet which need to be protected and need to be saved from the bad users which are rounding around the internet and using people's privacy to blackmail them and to threatens them. Rather on positive side there are many advantages of internet there are many disadvantages also of these internet it depends upon the user how is he using it and what kind of benefit is he fetching from the internet. There are many types of cyber securities in this blog I am going to tell you about 5 types of cyber securities in detail with all points which I have in my mind so read it and take the information from my blog which are you searching for.

1.  Network Security

2.  Cloud Security

3.  Application Security

4.  Critical Infrastructure Security

5.  Internet of Things (Io T) Security

                                      This 5 major types of Cyber Securities are defined briefly below 

             Network :

                        Network security is used to protect our network from harmful people and other threats. This is a very big and overarching term to protect the hardware and software of different processes and configurations of different networks which are related to use. There are many types of network securities like wireless securities, firewalls securities, Application securities, Behavioral securities, Access control securities etc. There are three major elements of network securities availability, integrity, confidentiality each element represents the fundamental objective of the information security. There are 7 layers of network security they are monitor and test your solutions and protect and backup the data, strong access control and physical security of the network. Keeping informed is the basic measure of the network security and other one like installing the antivirus and always test your own security so we can know that our security is also updated and can make us feel that we are not insecure. 


                  Cloud :

                       It is also known as the cloud computing security. It is specially designed to protect the cloud based infrastructure, applications and data. This security ensures the user and device the authentication the data's privacy protection. Their are three types of cloud securities like data security, identity and access management (IAM), Data retention (DR) and business continuity (BC) planning. Three categories of cloud security are private, public and hybrid. By cloud web security the entire traffic gets to the servers directly instead of routed here and there. Businesses are constantly at risk of theft and particularly when their physical assets are not fully secured. The best way to keep the thieves at bay is to split the security into four layers. They are access control, identification, detection and deterrence. The primary difference between cyber security and cloud security is that cloud security ensures that the data which is stored in cloud is free from the unauthorized use. While the cyber security ensures that the user's device is free from the particular cybercrimes. I am pretty sure that your mind would have the question that why cloud security is safe ? well the answer is First. mostly servers are located in the warehouses which most of the workers don't have access to and Second, the files stored in the cloud is encrypted that's why it is scrambled and couldn't be easy for the cybercriminals to access.


              Application :

                                    Application securities are used to testing, developing and adding the security features inside the applications to prevent security threats and such as unauthorized access and modifications. Application security testing, authentication, logging, encryption and authorization are all examples of the application security. Users can also use the codes to reduce the security flaws in the applications or soft wares. There are three phases of application software like GRASP, ASSESS. ADAPT. There are four types of securities they are hybrid securities. debt securities, derivative securities, equity securities. It is a very important security because it is not a single technology rather it's a set of practices, functions and features. It is used to added up the organization's software to help and prevent  and remediate threats from cyber attackers, data breaches and other sources. The top three common risks of the application security are injection, broken access control and cryptographic failures. The ultimate goal of the application security is to prevent attackers from accessing, modifying or deleting the sensitive and proprietary data. Best practices of web application security are perform security exercises, adopt a cybersecurity framework. include everyone in security practices, maintain a bounty program etc.


                Critical Infrastructure :

                           The security which describes the physical, cyber systems and assets that are so vital to the US that their incapacity would have debilitating impact on our physical or economic security, public health and safety. The three main elements of critical infrastructure security are physical, cyber and human. these are explicitly identified and should be integrated throughout the steps of framework as should be appropriate. Critical infrastructure security is used to keep essential services running and relies on both public and private cooperation models. Critical infrastructure security includes very large network of railways, tunnels, buildings, utilities, highways and connecting bridges etc. Infrastructure security is the practice of protecting the critical systems and assets against physical and cyber threats. The six major components of infrastructure security are management reports, methodologies, business policies, business processes, people and organizations, and systems and data. Cyber security is referred to the practice of reducing the cyber risks through the protection of the entire information technology infrastructure. Infrastructure includes energy, water, transportation and healthcare systems which are used in daily basis. 


              Internet of Things (Io T) :

                               Io T can be defined as a cybersecurity strategy and protection mechanism protection which safeguards against the possible cyber attacks which specially target the physical Io T devices that are attached to the network. Io T is the practice which keeps your devices safe. Io T is the tool which protect your data from threats and breaches. It identify and monitors the risks and also can fix the vulnerabilities. Io T ensures the availability, confidentiality and integrity of your Io T solution. The main types of Io T security are secure onboarding device authorization, device authentication and data encryption. their are also some security issues of Io T they are weak passwords, poor testing, lack of visibility, limited security integration etc. The five main principles of the Io T security are secure the boots, secure physical transport layer and robustness, secure firmware over the air, secure physical interfaces and the application programme interfaces. 



                       Thank you for reading my blog :-)

            

                 














Comments