What is Cyber Security? | Definition, Types, Principles

Definition

Cyber secu­ri­ty is the type of secu­ri­ty that is for sys­tems con­nect­ed to the inter­net. Cyber Secu­ri­ty is made up of two words, the first word is cyber and the sec­ond word is Secu­ri­ty. Cyber means what­ev­er is con­nect­ed with the inter­net, infor­ma­tion, Tech­nol­o­gy, com­put­er, net­work, Appli­ca­tion, and data is called cyber. And Secu­ri­ty which is relat­ed to safe­ty. Secu­ri­ty means What­ev­er is con­nect­ed to the sys­tem secu­ri­ty, appli­ca­tion secu­ri­ty, net­work secu­ri­ty, and infor­ma­tion secu­ri­ty is called secu­ri­ty.

Advertisement — TillExam
YouTube

Subscribe on YouTube

Get free tutorials, exam tips & updates.

Subscribe
WhatsApp

Join WhatsApp Channel

Stay updated with instant alerts.

Follow
Mock Test

Free SSC Mock Tests

Boost your preparation with free practice tests.

Start Now
Job Alerts

Govt Job Alerts

Get free daily updates on government jobs.

Get Alerts
Cyber Secu­ri­ty

Types of Cyber security

Appli­ca­tion Secu­ri­ty:- The tech­nique of pre­vent­ing data and code from being hacked is known as appli­ca­tion secu­ri­ty. We build, add, and test secu­ri­ty fea­tures with­in the appli­ca­tion as part of the appli­ca­tion secu­ri­ty process to pro­tect against threats such as unau­tho­rized access and modification.

Cloud Secu­ri­ty:-  Cloud secu­ri­ty is a process of pre­vent­ing data that is stored online via cloud com­put­ing plat­forms. It pro­tects cloud com­put­ing envi­ron­ments, appli­ca­tions run­ning in the cloud, and data stored in the cloud.

Oper­a­tional Secu­ri­ty:- Oper­a­tional secu­ri­ty is the process of pre­vent­ing data which is get­ting unau­tho­rized access. It is a risk man­age­ment process that pro­tects sen­si­tive infor­ma­tion from get­ting in the wrong hands. 

Net­work Secu­ri­ty:- Net­work secu­ri­ty is the process of pre­vent­ing data of your com­put­er net­work from attack­ers either inside or out­side of the net­work. Net­work secu­ri­ty includes both hard­ware and soft­ware technologies.

Principles of Cyber Security

1) Con­fi­den­tial­i­ty: Cyber secu­ri­ty should ensure that the infor­ma­tion to be pro­tect­ed is only acces­si­ble to autho­rised users and that unau­tho­rised par­ties are not giv­en access to it. Access to a cloud-based Cus­tomer Rela­tion­ship Man­age­ment (CRM) sys­tem, for exam­ple, can be restrict­ed to users with the cor­rect user­name-pass­word com­bi­na­tion to ensure the con­fi­den­tial­i­ty of firm infor­ma­tion. Data encryp­tion, which is an addi­tion­al lay­er of secu­ri­ty, is used by most sys­tems to ensure secre­cy. Decryp­tion of the data neces­si­tates the use of the appro­pri­ate key by an indi­vid­ual or system.

2) Integri­ty: Infor­ma­tion should be accu­rate, con­sis­tent, and not sub­ject to unau­tho­rised mod­i­fi­ca­tion as part of cyber secu­ri­ty oper­a­tions. Integri­ty is achieved, for exam­ple, when pro­ce­dures are put in place to ensure that email com­mu­ni­ca­tion between a sales rep­re­sen­ta­tive and a cus­tomer is not inter­cept­ed and mod­i­fied by an intrud­er while it is still in tran­sit, as shown in the CRM example.

3) Avail­abil­i­ty: Efforts to secure infor­ma­tion in cyber­space should not pre­vent autho­rised par­ties from access­ing it. Addi­tion­al­ly, in the event of a cyber secu­ri­ty breach, redun­dan­cy access must be pro­vid­ed.
For exam­ple, a cor­po­ra­tion that uses a cloud-based CRM sys­tem can use proxy servers and fire­walls as a secu­ri­ty mech­a­nism against DoS assaults, which, if suc­cess­ful, would result in sys­tem unavailability.

Share this:
Scroll to Top