Page 60 - CITS - Computer Software Application -TT
P. 60
COMPUTER SOFTWARE APPLICATION - CITS
Cyber security systems & cyber laws
Cybersecurity systems refer to the technologies, processes, and practices implemented to protect computer
systems, networks, and data from various forms of cyber threats. These threats can include unauthorized access,
data breaches, malware infections, phishing attacks, and more. Cybersecurity systems play a critical role in
maintaining the confidentiality, integrity, and availability of digital assets and information.
Types of Cyber Security
Cybersecurity encompasses a wide range of practices, technologies, and measures designed to protect computer
systems, networks, and data from cyber threats and attacks. There are various types of cybersecurity that focus
on different aspects of protection. Here are some of the main types:
1 Network Security: Network security focuses on protecting the integrity, confidentiality, and availability of
a network and its data. This involves measures like firewalls, intrusion detection systems (IDS), intrusion
prevention systems (IPS), virtual private networks (VPNs), and network segmentation.
2 Endpoint Security: Endpoint security involves securing individual devices (endpoints) like computers,
smartphones, and tablets. This is achieved through antivirus software, anti-malware solutions, and other tools
to prevent, detect, and respond to threats on these devices.
3 Application Security: Application security focuses on securing software applications and the code they are built
upon. This includes identifying and addressing vulnerabilities in software to prevent exploitation by attackers.
4 Cloud Security: As more data and services move to the cloud, cloud security becomes crucial. It involves
securing data, applications, and infrastructure hosted in cloud environments, and ensuring proper access
controls and encryption.
5 Data Security: Data security involves protecting sensitive data from unauthorized access, theft, or breaches.
This can include encryption, access controls, data masking, and data loss prevention (DLP) solutions.
6 Identity and Access Management (IAM): IAM is about ensuring that only authorized individuals have access to
the appropriate resources. It includes techniques like multi-factor authentication (MFA), single sign-on (SSO),
and user access management.
7 Incident Response: Incident response is the process of managing and mitigating the consequences of a
cybersecurity incident. It involves identifying, containing, eradicating, and recovering from attacks to minimize
damage and restore normal operations.
8 Security Operations Center (SOC): A SOC is a centralized unit that monitors and responds to security threats
in real-time. It uses advanced tools and technologies to detect, analyze, and respond to incidents.
9 Vulnerability Management: This involves identifying and addressing vulnerabilities in software and systems
before they can be exploited by attackers. Regular vulnerability assessments and patch management are key
components.
10 Penetration Testing: Also known as ethical hacking, penetration testing involves simulating cyberattacks to
identify vulnerabilities and weaknesses in systems and networks. This helps organizations proactively address
these issues.
11 Physical Security: Physical security is about protecting the physical assets of an organization, such as data
centers and hardware, from unauthorized access, theft, and damage.
12 Mobile Security: As mobile devices become more prevalent, mobile security focuses on protecting smartphones,
tablets, and other mobile devices from malware, data theft, and unauthorized access. These are just some
of the many facets of cybersecurity. Organizations often adopt a multi-layered approach, combining various
types of cybersecurity measures to create a comprehensive security strategy that addresses a wide range of
potential threats.
Why is cybersecurity important?
In today’s interconnected world, advanced cyberdefense programs bring benefits to all. On an individual level, a
cybersecurity attack can lead to severe consequences ranging from identity theft to extortion attempts and even
the loss of precious data such as family photographs. The reliance on critical infrastructure, including power
plants, hospitals, and financial service firms, is universal. Securing these vital entities is paramount to maintaining
the functioning of our society.
Moreover, the efforts of cyberthreat researchers play a crucial role in benefiting everyone. For instance, the
team of 250 threat researchers at Talos engages in the investigation of emerging threats and strategies for
cyberattacks. Their work includes identifying new vulnerabilities, enlightening the public about the significance of
cybersecurity, and fortifying open source tools. The impact of their endeavors extends to making the internet a
safer space for all users.
47
CITS : IT&ITES - Computer Software Application - Lesson 01-17