What Is Cybersecurity?

Definition of ‘Cyber Security’

Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.

Description:Major areas covered in cyber security are:


1)Application Security

2)Information Security

3)Disaster recovery

4)Network Security

Application Security encompasses measures or counter-measures that are taken during the development life-cycle to protect applications from threats that can come through flaws in the application design, development, deployment, upgrade or maintenance. Some basic techniques used for application security are:
a)Input parameter validation,
b)User/Role Authentication & Authorization,
c)Session management, parameter manipulation & exception management, and

d)Auditing and logging.

Information Security protects information from unauthorized access to avoid identity theft and to protect privacy. Major techniques used to cover this are:

a)Identification, authentication & authorization of user,


Disaster Recovery planning is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster. Any business should have a concrete plan for disaster recovery to resume normal business operations as quickly as possible after a disaster.

Network Security includes activities to protect the usability, reliability, integrity and safety of the network. Effective network security targets a variety of threats and stops them from entering or spreading on the network. Network security components include:

a)Anti-virus and anti-spyware,
b)Firewall, to block unauthorized access to your network,
c)Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks, and
d)Virtual Private Networks (VPNs), to provide secure remote access.

Types of Cybersecurity Threats

Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.

Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.

Social engineering
Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.

Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails.






Souce:https://economictimes.indiatimes.com/definition/cyber-security   https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html