Page 60 - CITS - Computer Software Application -TT
P. 60

COMPUTER SOFTWARE APPLICATION - CITS

            Cyber security systems & cyber laws


           Cybersecurity  systems  refer  to  the  technologies,  processes,  and  practices  implemented  to  protect  computer
           systems, networks, and data from various forms of cyber threats. These threats can include unauthorized access,
           data  breaches,  malware  infections,  phishing  attacks,  and  more.  Cybersecurity  systems  play  a  critical  role  in
           maintaining the confidentiality, integrity, and availability of digital assets and information.
           Types of Cyber Security
           Cybersecurity encompasses a wide range of practices, technologies, and measures designed to protect computer
           systems, networks, and data from cyber threats and attacks. There are various types of cybersecurity that focus
           on different aspects of protection. Here are some of the main types:
           1  Network  Security:  Network  security  focuses  on  protecting  the  integrity,  confidentiality,  and  availability  of
              a network and its data. This involves measures like firewalls, intrusion detection systems (IDS), intrusion
              prevention systems (IPS), virtual private networks (VPNs), and network segmentation.
           2  Endpoint  Security:  Endpoint  security  involves  securing  individual  devices  (endpoints)  like  computers,
              smartphones, and tablets. This is achieved through antivirus software, anti-malware solutions, and other tools
              to prevent, detect, and respond to threats on these devices.
           3  Application Security: Application security focuses on securing software applications and the code they are built
              upon. This includes identifying and addressing vulnerabilities in software to prevent exploitation by attackers.
           4  Cloud Security: As more data and services move to the cloud, cloud security becomes crucial. It involves
              securing data, applications, and infrastructure hosted in cloud environments, and ensuring proper access
              controls and encryption.
           5  Data Security: Data security involves protecting sensitive data from unauthorized access, theft, or breaches.
              This can include encryption, access controls, data masking, and data loss prevention (DLP) solutions.
           6  Identity and Access Management (IAM): IAM is about ensuring that only authorized individuals have access to
              the appropriate resources. It includes techniques like multi-factor authentication (MFA), single sign-on (SSO),
              and user access management.
           7  Incident  Response:  Incident  response  is  the  process  of  managing  and  mitigating  the  consequences  of  a
              cybersecurity incident. It involves identifying, containing, eradicating, and recovering from attacks to minimize
              damage and restore normal operations.
           8  Security Operations Center (SOC): A SOC is a centralized unit that monitors and responds to security threats
              in real-time. It uses advanced tools and technologies to detect, analyze, and respond to incidents.
           9  Vulnerability Management: This involves identifying and addressing vulnerabilities in software and systems
              before they can be exploited by attackers. Regular vulnerability assessments and patch management are key
              components.
           10 Penetration Testing: Also known as ethical hacking, penetration testing involves simulating cyberattacks to
              identify vulnerabilities and weaknesses in systems and networks. This helps organizations proactively address
              these issues.
           11 Physical Security: Physical security is about protecting the physical assets of an organization, such as data
              centers and hardware, from unauthorized access, theft, and damage.
           12 Mobile Security: As mobile devices become more prevalent, mobile security focuses on protecting smartphones,
              tablets, and other mobile devices from malware, data theft, and unauthorized access. These are just some
              of the many facets of cybersecurity. Organizations often adopt a multi-layered approach, combining various
              types of cybersecurity measures to create a comprehensive security strategy that addresses a wide range of
              potential threats.
           Why is cybersecurity important?
           In today’s interconnected world, advanced cyberdefense programs bring benefits to all. On an individual level, a
           cybersecurity attack can lead to severe consequences ranging from identity theft to extortion attempts and even
           the loss of precious data such as family photographs. The reliance on critical infrastructure, including power
           plants, hospitals, and financial service firms, is universal. Securing these vital entities is paramount to maintaining
           the functioning of our society.
           Moreover,  the  efforts  of  cyberthreat  researchers  play  a  crucial  role  in  benefiting  everyone.  For  instance,  the
           team  of  250  threat  researchers  at Talos  engages  in  the  investigation  of  emerging  threats  and  strategies  for
           cyberattacks. Their work includes identifying new vulnerabilities, enlightening the public about the significance of
           cybersecurity, and fortifying open source tools. The impact of their endeavors extends to making the internet a
           safer space for all users.


                                                           47

                              CITS : IT&ITES - Computer Software Application - Lesson 01-17
   55   56   57   58   59   60   61   62   63   64   65