Cyber Security: What is it?

Mohit Varikuti
3 min readDec 27, 2021

The process of protecting computers, servers, mobile devices, electronic systems, networks, and data against hostile assaults is known as cyber security. It’s also known as electronic information security or information technology security. The word is used in a number of situations, ranging from business to mobile computing, and it may be broken down into a few categories.

Key Points

  • The technique of safeguarding a computer network from intruders, whether deliberate attackers or opportunistic malware, is known as network security.
  • The goal of application security is to keep software and devices safe against attacks. A hacked program might provide access to the data it was supposed to safeguard. Security starts throughout the design phase, long before a program or device is deployed.
  • Data integrity and privacy are protected by information security, both in storage and in transport.
  • The methods and decisions for handling and securing digital assets are included in operational security. The processes that define how and where data may be kept or exchanged, as well as the rights users, have while accessing a network, all fall under this umbrella.
  • Disaster recovery and business continuity are terms used to describe how a company reacts in the case of a cyber-security breach or any other catastrophe that results in the loss of operations or data. Disaster recovery policies define how an organization recovers operations and information to the same operational capabilities as before the disaster. Business continuity is the strategy that an organization uses when it is unable to operate due to a lack of resources.
  • End-user education tackles the most unpredictably unpredictable aspect of cyber-security: humans. By failing to follow proper security procedures, anybody might unintentionally introduce a virus into an otherwise protected system. It is critical for every organization’s security to teach people to delete suspicious email attachments, not plug in unfamiliar USB devices, and a variety of other crucial teachings.

The Danger of Cyber Threats

The worldwide cyber threat is rapidly evolving, with an increasing number of data breaches each year. According to research released by RiskBased Security, data breaches exposed 7.9 billion records in the first nine months of 2019. This is more than twice (112%) the number of records revealed in the same time period last year.

Most breaches occurred in medical services, retail, and government institutions, with malevolent criminals being accountable for the majority of instances. Because they gather financial and medical data, some of these industries are particularly enticing to cybercriminals, but any firm that uses networks might be attacked for consumer data, corporate espionage, or cybercrime.

The International Data Corporation forecasts that global expenditure on cyber-security solutions will reach a staggering $133.7 billion by 2022, as the size of the cyber threat continues to grow. Governments all around the world have issued guidelines to assist businesses to establish strong cyber-security procedures in response to the growing cyber threat.

The National Institute of Standards and Technology (NIST) in the United States has developed a cyber-security architecture. The framework advocates constant, real-time monitoring of all electronic resources to fight the spread of harmful malware and help in early identification.

The significance of system monitoring is reflected in the UK government’s National Cyber Security Centre’s “10 stages to cyber security” guideline. The Australian Cyber Security Centre (ACSC) offers recommendations on how companies can combat the newest cyber-security threats on a regular basis in Australia.

Some digital dangers

Normal digital dangers include:

  1. Malware, for example, ransomware, botnet programming, RATs (remote access Trojans), rootkits and bootkits, spyware, Trojans, infections, and worms.
  2. Secondary passages, which permit remote access.
  3. Formjacking, which embeds malevolent code into online structures.
  4. Cryptojacking, which introduces illegal digital currency mining programming.
  5. DDoS (disseminated disavowal of administration) assaults, which flood servers, frameworks, and organizations with traffic to thump them disconnected.
  6. DNS (space name framework) harming assaults, which compromises the DNS to divert traffic to noxious destinations.

(This is a basic understanding of cyber dangers I will write more about in the future)

--

--

Mohit Varikuti

Im some random highschooler on the internet who likes to write about AI and tech and stuff. Leave a follow if u like my stuff I really appreciate it!