Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
For an effective cyber security, an organization needs to coordinate its efforts throughout its entire information system. Elements of cyber encompass all of the following:
Types of cyber security
- Network security
- Application security
- Endpoint security
- Data security
- Identity management
- Database and infrastructure security
- Cloud security
- Mobile security
- Disaster recovery/business continuity planning
- End-user education
The most difficult challenge in cyber security is the ever-evolving nature of security risks themselves. Traditionally, organizations and the government have focused most of their cyber security resources on perimeter security to protect only their most crucial system components and defend against known treats. Today, this approach is insufficient, as the threats advance and change more quickly than organizations can keep up with. As a result, advisory organizations promote more proactive and adaptive approaches to cyber security.
Types of cyber security threats
Phishing is the exercise of sending untrue emails that look like emails from reputable sources. The purpose is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber-attack. You can help shield yourself through learning or a technology resolution that filters malicious emails.
This is a type of malicious software. It is intended to extort money by obstructive access to records or the computer system until the payoff is paid. Paying the payoff does not guarantee that the files will be recovered or the system reestablished.
Malware is a type of software designed to gain unapproved access or to cause destruction to a computer.