Cyber Security

Cyber Security

Cyber security is the art of protecting computer systems, servers, networks, mobile devices, and electronic gadgets from exposing information and defending it from malicious harm to their hardware, software, or electronic data.

                                  Elements of cybersecurity

  1. Network security: it consists of strategy, procedures, and practices utilized and applied to prevent, detect and monitor unpermitted access, misuse, diminishing, or denial of computer and networks available resources. it involves permission to access data in a network, which is controlled by a network director.
  2. Cloud security: is a large set of strategies, technologies, implementation, and controls applied to protect virtualized IP, data information, applications, services, and associated infrastructure of cloud computing. It provides users with the ability to store and process their data in third-party data centers.
  3. Application security: processes used to protect software application code and information against cyber-attacks.
  4. Mobile security: it is a defense of smartphones, tablets, and laptops from dangers associated with wireless computing.
  5. Browser security: this is the implementation of internet security to the web browser to safeguard networked data and computer systems from violations of privacy or malware.
  6. Information security: this is a set of practices to keep information safe from illegitimate access or modification.

                                                  Types of cyber security

  1. Anti-malware
  2. Anti-spyware
  3. Anti-virus software
  4. Firewall
  5. Anti-tamper software
  6. Anti keyloggers
  7. Anti-subversion software
  8. Sandbox
  9. Security information software
  10. Vulnerability
  11. Cryptographic software
  12. Intrusion detection system (IDS)
  13. Intrusion prevention system (IPS)
  14. Software and operating system updating
  15. Computer-aided dispatch (CAD)
  1. Anti-malware: is software that safeguards the computer system from malware such as worms, spyware, Ransomware, etc. it scans the computer system for all types of evil software that tries to reach the computer.

                                      Essential anti-malware components

  1. Sandboxing: this is a secure environment that is a safe testing ground that isolates code that needs to be tested that has the power to affect your networks.
  2. Firewall: a network security device, either hardware or software-based which scans all outgoing and incoming traffics and is established on a designated set of security it accepts, rejects, or drops that specific traffic.
  3. Heuristics analysis: is a procedure by which many computer antivirus programs are designed to discern previously unknown computer viruses as well as a new variant of viruses that determines the vulnerability of a system towards a particular threat using various decision rules.
  4. Signature-based detection is the use of footprints to identify malware. These malware footprints are stored in a database. When scanning a computer, they will search for footprints matching those of known malware

1 thought on “Cyber Security”

Leave a Reply to דירות דיסקרטיות בירושלים - israel night club Cancel Reply

Your email address will not be published. Required fields are marked *