What is Cyber Security? | Definition, Types, Principles

Definition

Cyber secu­ri­ty is the type of secu­ri­ty that is for sys­tems con­nect­ed to the inter­net. Cyber Secu­ri­ty is made up of two words, the first word is cyber and the sec­ond word is Secu­ri­ty. Cyber means what­ev­er is con­nect­ed with the inter­net, infor­ma­tion, Tech­nol­o­gy, com­put­er, net­work, Appli­ca­tion, and data is called cyber. And Secu­ri­ty which is relat­ed to safe­ty. Secu­ri­ty means What­ev­er is con­nect­ed to the sys­tem secu­ri­ty, appli­ca­tion secu­ri­ty, net­work secu­ri­ty, and infor­ma­tion secu­ri­ty is called secu­ri­ty.

  • Save
Cyber Secu­ri­ty

Types of Cyber security

Appli­ca­tion Secu­ri­ty:- The tech­nique of pre­vent­ing data and code from being hacked is known as appli­ca­tion secu­ri­ty. We build, add, and test secu­ri­ty fea­tures with­in the appli­ca­tion as part of the appli­ca­tion secu­ri­ty process to pro­tect against threats such as unau­tho­rized access and modification.

Cloud Secu­ri­ty:-  Cloud secu­ri­ty is a process of pre­vent­ing data that is stored online via cloud com­put­ing plat­forms. It pro­tects cloud com­put­ing envi­ron­ments, appli­ca­tions run­ning in the cloud, and data stored in the cloud.

Oper­a­tional Secu­ri­ty:- Oper­a­tional secu­ri­ty is the process of pre­vent­ing data which is get­ting unau­tho­rized access. It is a risk man­age­ment process that pro­tects sen­si­tive infor­ma­tion from get­ting in the wrong hands. 

Net­work Secu­ri­ty:- Net­work secu­ri­ty is the process of pre­vent­ing data of your com­put­er net­work from attack­ers either inside or out­side of the net­work. Net­work secu­ri­ty includes both hard­ware and soft­ware technologies.

Principles of Cyber Security

1) Con­fi­den­tial­i­ty: Cyber secu­ri­ty should ensure that the infor­ma­tion to be pro­tect­ed is only acces­si­ble to autho­rised users and that unau­tho­rised par­ties are not giv­en access to it. Access to a cloud-based Cus­tomer Rela­tion­ship Man­age­ment (CRM) sys­tem, for exam­ple, can be restrict­ed to users with the cor­rect user­name-pass­word com­bi­na­tion to ensure the con­fi­den­tial­i­ty of firm infor­ma­tion. Data encryp­tion, which is an addi­tion­al lay­er of secu­ri­ty, is used by most sys­tems to ensure secre­cy. Decryp­tion of the data neces­si­tates the use of the appro­pri­ate key by an indi­vid­ual or system.

2) Integri­ty: Infor­ma­tion should be accu­rate, con­sis­tent, and not sub­ject to unau­tho­rised mod­i­fi­ca­tion as part of cyber secu­ri­ty oper­a­tions. Integri­ty is achieved, for exam­ple, when pro­ce­dures are put in place to ensure that email com­mu­ni­ca­tion between a sales rep­re­sen­ta­tive and a cus­tomer is not inter­cept­ed and mod­i­fied by an intrud­er while it is still in tran­sit, as shown in the CRM example.

3) Avail­abil­i­ty: Efforts to secure infor­ma­tion in cyber­space should not pre­vent autho­rised par­ties from access­ing it. Addi­tion­al­ly, in the event of a cyber secu­ri­ty breach, redun­dan­cy access must be pro­vid­ed.
For exam­ple, a cor­po­ra­tion that uses a cloud-based CRM sys­tem can use proxy servers and fire­walls as a secu­ri­ty mech­a­nism against DoS assaults, which, if suc­cess­ful, would result in sys­tem unavailability.

Leave a Comment

Share via
Copy link
Verified by MonsterInsights