Cyber security involves protecting computers, servers, mobile devices, and networks from malicious attacks. It has several categories including network security, application security, information security, operational security, disaster recovery, and end-user education. Network security focuses on securing computer networks from intruders. Application security aims to keep software and devices safe from attacks. Information security protects data integrity and privacy in storage and transport. Operational security includes how digital assets are handled and secured. Disaster recovery and business continuity describe how an organization responds to security breaches or data loss. End-user education teaches safe security practices to prevent unintentional introduction of viruses.
Cyber security involves protecting computers, servers, mobile devices, and networks from malicious attacks. It has several categories including network security, application security, information security, operational security, disaster recovery, and end-user education. Network security focuses on securing computer networks from intruders. Application security aims to keep software and devices safe from attacks. Information security protects data integrity and privacy in storage and transport. Operational security includes how digital assets are handled and secured. Disaster recovery and business continuity describe how an organization responds to security breaches or data loss. End-user education teaches safe security practices to prevent unintentional introduction of viruses.
Cyber security involves protecting computers, servers, mobile devices, and networks from malicious attacks. It has several categories including network security, application security, information security, operational security, disaster recovery, and end-user education. Network security focuses on securing computer networks from intruders. Application security aims to keep software and devices safe from attacks. Information security protects data integrity and privacy in storage and transport. Operational security includes how digital assets are handled and secured. Disaster recovery and business continuity describe how an organization responds to security breaches or data loss. End-user education teaches safe security practices to prevent unintentional introduction of viruses.
Cyber security involves protecting computers, servers, mobile devices, and networks from malicious attacks. It has several categories including network security, application security, information security, operational security, disaster recovery, and end-user education. Network security focuses on securing computer networks from intruders. Application security aims to keep software and devices safe from attacks. Information security protects data integrity and privacy in storage and transport. Operational security includes how digital assets are handled and secured. Disaster recovery and business continuity describe how an organization responds to security breaches or data loss. End-user education teaches safe security practices to prevent unintentional introduction of viruses.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1/ 1
Cyber Security
The practise of protecting computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks is known as cyber security. It's also known as electronic information security or information technology security. The word is used in a number of situations, ranging from business to mobile computing, and it may be broken down into a few categories. The practise of securing a computer network from intruders, whether targeted attackers or opportunistic malware, is known as network security. The goal of application security is to keep software and devices safe against attacks. A hacked programme might provide access to the data it was supposed to safeguard. Security starts throughout the design phase, long before a program or device is deployed. Data integrity and privacy are protected by information security, both in storage and in transport. The methods and decisions for handling and securing digital assets are included in operational security. The processes that define how and where data may be kept or exchanged, as well as the rights users have while accessing a network, all fall under this umbrella. Disaster recovery and business continuity are terms used to describe how a company reacts in the case of a cyber-security breach or any other catastrophe that results in the loss of operations or data. Disaster recovery policies describe how an organization restores activities and information to the same level as before the disaster. Business continuity is the strategy that an organization uses when it is unable to operate due to a lack of resources. End-user education tackles the most unpredictably unpredictable aspect of cyber-security: humans. By failing to follow proper security procedures, anybody might unintentionally introduce a virus into an otherwise protected system. It is critical for every organization's security to teach people to delete suspicious email attachments, not plug in unfamiliar USB devices, and a variety of other crucial teachings.