2. Computer security, cyber
security or information technology
security (IT security) is the protection
of computersystems and networks fr
om information disclosure, theft of or
damage to their hardware, software,
or electronic data, as well as from
the disruption or misdirection of the
services they provide.
3. Cyber system:
It is the combination of all
the resources that provides
cyber services. Resources
can be any facility,
equipment, procedures and
communications.
System security:
A computer system has many numbers of
security threads. The main objective of the
system security is to provide protection of
information. It also includes the
development of security measures.
4. There are some most common security
threads
Malware: it can be treated as malware software. It
contains disturbing or annoying software or program
code. It can be any virus, spyware or malicious root kit.
Virus: the virus can spread from one computer to
another with the help of email, file or software. It can
delete, corrupt or modify your complete data.
Trojan: it is a type of malware. It is designed to
damage or steals your information from your system. A
Trojan can do anything inside your system.
Spam: it refers to the spamming. In
the case of security spam used to define email
spam. Spam messages can contain infected
links that can harm your system.
5. Network security
Is a broad term. It is the set of
rules and procedures to protect
the network. In simple terms it is
the process of adopting security
measures related to physical and
software, to protect the network
infrastructure from unauthorized
activity.
6. Types of Network
security
It is important for all organization and small
businesses to protect their network from
attackers and hackers. Following are the types of
network securities.
Network access control: to ensure the network
security, access control should be limited or to be
given only authorized members. For example, you
could grant administrators complete access but
refuse to access some important file and folders.
Antivirus/malware: Use some best antivirus and anti-
malware software that will protect the network from
worms, Trojans and Ran some wares
7. Firewall: it is a network security system to protect the network from all
unauthorized activity. It permits or blocks the traffic according to the defined set of
rules. It can be a software utility or hardware device that acts as a filter for all
incoming traffic and connections.
Email security: attackers use personal information then create a phishing
campaign to deceive recipients. Email security is required for controlling these
types of phishing emails in order to prevent the loss of sensitive data
.
Application security: application security is very important because
attackers can enter into your network by using the weaknesses or holes of the
application. It is possible for any application to incorporates the software and
hardware you select for removing those holes and weaknesses.
VPN: It stands for the virtual private network. It provides network security by
encrypting the connection from an endpoint to network. It is another type of
network security which uses IP sec or secure sockets in remote-access VPN. It is
used for authenticating the communication between user and device
.
Wireless security: wireless networks are less secure than wired networks. It
is easy to break wireless network so the wireless security must be strong enough.
Use only that devices that provide the best security to the wireless network.
8. Why is Cyber Security Important
for Companies Today?
Often some organizations take their data security lightly and
as a result, they fall victim to cyber attacks. In fact, our
companies are still not immune to these evolving cyber
attacks. But thanks to these fast-developing technology
standards today, cyber security has become a priority for
every organization across the world.
9. Think you are secure online? Think again!
It is a serious matter of how cyber attacks are
shaping in every form possible in order to stay one
step ahead of the development in technology.
Phishing, ransom ware, cyber scams are some of
the common yet highly dangerous cyber attacks that
are designed with the motive to access and exploit
the user’s sensitive data and extort money out of it.
10. •Rise of Cyber Crimes
Be it a large scale or a small scale firm, hackers and cyber criminals spare
no one. Rather, they lookout for opportunities to exploit data and get money
out of these firms. Over the past year, the average cost of cyber crime for
an organization has increased 23% more than last year. With the
introduction of new technologies, the chances of cyber threats and risks are
also rapidly increasing
•Growth of Iot Devices
The introduction of Iot technology i.e. Internet of Things, has not only
simplified and speed up our tasks but has also created a pit of new
vulnerabilities for hackers to exploit. No matter how advanced security
measures we take, Cyber criminals will always stay one step ahead to
attempt cyber crimes. If these internet-connected devices are not managed
properly then they can provide a gateway to business to hackers or cyber
criminals!
11. •Bridge to Security Gap
Human resources and IT resources have always been one of the
most important aspects of any organization. Regardless of their
dependency on each other, there has always been a security gap
between both aspects. In order to bridge this gap, it is important to
provide individuals working in an organization with the right cyber
security awareness training. Training for employees is necessary to
bridge the gap of cyber security skills and to create a cyber-resilient
working culture in the organization.
Well, now you know why bridging the security gap is important!
12. ForensicsffFORENSICS
Forensic science is a combination of forensics and science. It means
applying scientific methods, tools and procedures for solving the
crime. The “forensic” word comes from the Latin word that means
public. Forensic science is a science used in public, in court or in the
justice system.
Applications of forensic science
•Inspection of physical evidence
•Clear and short reporting
•Understanding of data
•Management of tests
Forensic science is further classified:
•Forensic toxicology
•Forensic geology
•Forensic Botany
•Forensic DNA analysis
•Digital Forensic
•Forensic pathology
•Forensic archaeology
•Forensic podiatry
Forensics science can be a challenging task for new students because it has a very vast area. It covers many
subjects under one roof. It includes biochemistry, human sciences, physiology, chemistry as well as
mathematics.