0% found this document useful (0 votes)
20 views3 pages

Cyber Security New

Uploaded by

aasthasingh158
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views3 pages

Cyber Security New

Uploaded by

aasthasingh158
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Security

Cyber Security Introduction - Cyber Security Basics:

Cyber security is the most concerned matter as cyber threats and attacks are
overgrowing. Attackers are now using more sophisticated techniques to target the
systems. Individuals, small-scale businesses or large organization, are all being
impacted. So, all these firms whether IT or non-IT firms have understood the importance
of Cyber Security and focusing on adopting all possible measures to deal with cyber
threats.

The technique of protecting internet-connected systems such as computers, servers,


mobile devices, electronic systems, networks, and data from malicious attacks is known
as cyber security. We can divide cyber security into two parts one is cyber, and the
other is security. Cyber refers to the technology that includes systems, networks,
programs, and data. And security is concerned with the protection of systems, networks,
applications, and information. In some cases, it is also called electronic information
security or information technology security.

Some other definitions of cyber security are:

"Cyber Security is the body of technologies, processes, and practices


designed to protect networks, devices, programs, and data from attack,
theft, damage, modification or unauthorized access."

"Cyber Security is the set of principles and practices designed to protect our
computing resources and online information against threats."

What is cyber security all about?


A successful cyber security approach has multiple layers of protection spread
across the computers, networks, programs, or data that one intends to keep
safe. In an organization, the people, processes, and technology must all
complement one another to create an effective defense from cyber attacks.
A unified threat management system can automate integrations across
select Cisco Security products and accelerate key security operations
functions: detection, investigation, and remediation.

People
Users must understand and comply with basic data security principles like
choosing strong passwords, being wary of attachments in email, and backing
up data.
Processes
Organizations must have a framework for how they deal with both attempted and
successful cyber attacks. One well-respected framework can guide you. It explains how
you can identify attacks, protect systems, detect and respond to threats, and recover
from successful attacks.

Technology
Technology is essential to giving organizations and individuals the computer security
tools needed to protect themselves from cyber attacks. Three main entities must be
protected: endpoint devices like computers, smart devices, and routers; networks; and
the cloud. Common technology used to protect these entities include next-generation
firewalls, DNS filtering, malware protection, antivirus software, and email security
solutions.

Why is cyber security important?

Listed below are the reasons why cyber security is so important in predominant digital world:

In today’s connected world, everyone benefits from advanced cyber defense


programs. At an individual level, a cyber security attack can result in everything
from identity theft, to extortion attempts, to the loss of important data like family
photos.
Everyone relies on critical infrastructure like power plants, hospitals, and financial
service companies. Securing these and other organizations is essential to keeping
our society functioning.

Cyber attacks can be extremely expensive for businesses to endure.

In addition to financial damage suffered by the business, a data breach can also inflict

untold reputational damage.

Cyber-attacks these days are becoming progressively destructive. Cybercriminals are

using more sophisticated ways to initiate cyber attacks.

Regulations such as GDPR are forcing organizations into taking better care of the

personal data they hold.

Because of the above reasons, cyber security has become an important part of the

business and the focus now is on developing appropriate response plans that minimize

the damage in the event of a cyber attack.


But, an organization or an individual can develop a proper response plan only when he

has a good grip on cyber security fundamentals.

You might also like