Thursday, 13 May 2021

 

 

CYBER SECURITY

INTRODUCTION

The internet has made the world smaller in many ways but it has also opened us up to influences that have never before been so varied and so challenging.  As fast as security grew, the hacking world grew faster.

There are two ways of looking at the issue of cyber security. One is that the companies that provide cloud computing do that and only that so these companies will be extremely well secured with the latest in cutting edge encryption technology.

CYBER SECURITY

It’s being protected by internet-connected systems, including hardware, software and data, from cyber-attacks. In a computing context, security comprises cyber security and physical security both are used by enterprises to safe against unauthorized access to data center and other computerized systems.

The security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cyber security.

ADVANTAGES OF CYBER SECURITY:

Cyber Security provides protection against theft of data, protects computers from theft, minimizing computer freezing, provides privacy for users, it offers strict regulation, and it’s difficult to work with non-technical people.

v  It protects the personal and sensitive data of an individual and organizations from being stolen.

v  The most important aspect is that it enhances the security of the system in cyberspace.

v  It eliminates the risk of computers being hacked, thus mitigating the risk of system freezes and crashes

v  It enhances overall security mechanisms of the business with the use of an improved information framework and results in smooth business management activities.

v  It protects the system against spyware, virus, malicious codes, Trojan horses, worms, and several other unwanted infectious programs.

DISADVANTAGES OF CYBER SECURITY:

Firewalls can be difficult to configure correctly, faulty configured firewalls may prohibit users from performing any behavior on the Internet before the Firewall is properly installed, and you will continue to upgrade the latest software to retain protection current, Cyber Protection can be expensive for ordinary users.

v  Besides, cyber security would cost a significant number of users.

v  Cyber security can be a costly affair; as highly trained professionals are required.

v  Latest security patches must be updated regularly with the latest security definitions, which is difficult to keep up with

 

EFFECTS OF CYBER SECURITY:

 

v  Your company is impacted by cyber crime, A company’s lack of commitment to information security can be very negative.

v  The direct economic impact of such attacks on companies, such as robbery of corporate information, interruption of trade, or even the maintenance of damaged systems, can contribute to loss of revenue.

IMPORTANCE OF CYBER SECURITY:

Cyber security is an important affair because of the amounts of data that is being collected and stored over the internet and servers of the organizations. Several significant militarizes, medical, government, corporate, industries and financial organizations depend on the data stored on their servers

CYBER SECURITY GOALS:

The objective of Cyber security is to protect information from being stolen, compromised or attacked.

Cyber security can be measured by at least one of three goals-

Ø  Protect the confidentiality of data.

Ø  Preserve the integrity of data.

Ø  Promote the availability of data for authorized users.

 

WHY WE NEED CYBER SECURITY?

The range of operations of cyber security involves protecting information and systems from major cyber threats. These threats take many forms. As a result, keeping pace with cyber security strategy and operations can be a challenge, particularly in government and enterprise networks where, in their most innovative form, cyber threats often take aim at secret, political and military assets of a nation, or its people. Some of the common threats are:

v  Cyber terrorism It is the innovative use of information technology by terrorist groups to further their political agenda. It took the form of attacks on networks, computer systems and telecommunication infrastructures.

 

MAINTENANCE OF EFFECTIVE CYBER SECURITY

Historically, organizations and governments have taken a reactive, “point product” approach to combating cyber threats, produce something together individual security technologies – one on top of another to safe their networks and the valuable data within them. Not only is this method expensive and complex, but news of damaging cyber breaches continues to dominate headlines, rendering this method ineffective

 

 

CYBER SECURITY CAN PREVENT

The use of cyber security can help prevent cyber-attacks, data breaches and identity theft and can aid in risk management. When an organization has a strong sense of network security and an effective incident response plan, it is better able to prevent and  serious of  these attacks. For example, end user protection defends information and guards against loss or theft while also scanning computers for malicious code.

TYPES OF CYBER SECURITY THREATS:

v   The use of keeping up with new technologies, security trends and threat intelligence is a challenging their task. However, it should be in order to protect information and other assets from cyber threats, which take many forms.

v   Ransom ware is a type of malware that involves an attacker locking the victim's computer system files typically through encryption and demanding a payment to decrypt and unlock them.

v  Malware is any file or program used to harm a computer user, such as worms, computer viruses, Trojan horses and spyware.

THE LEVEL OF CYBER RISK

There are some additional reasons for that threat is overrated. First, as combating cyber-threats has become a highly politicized issue, official statements about the level of threat must also be seen in the context of different bureaucratic entities that compete against each other for resources and influence. This is usually done by stating an urgent need for action (which they should take) and describing the overall threat as big and rising. Second, psychological research has shown that risk perception is highly dependent on intuition and emotions, as well as the perceptions of experts (Gregory and Mendelssohn 1993). Cyber-risks, especially in their more extreme form, fit the risk profile of so-called „dread risks, which appear uncontrollable, catastrophic, fatal, and unknown.

REDUCING CYBER – IN - SECURITY         

The three different debates have been taken over the many concepts and counter measures have been produced with their focus.  The computer network which owns an entity has a common practice to take a responsible for protecting it. However, there are some assets considered so crucial in the private sector to the functioning of society and governments have to take additional measures to ensure the level of protection. These efforts are usually included under the label of critical (information). Information assurance is guide for the infrastructure protection and to the management of risk, which is essentially about accepting that one is (or remains) insecure: the level of risk can never be reduced to zero.

CONCLUSION  

Depending on their (potential) severity, however, disruptive incidents in the future will continue to fuel the military discourse, and with it fears of strategic cyber-war. Certainly, thinking about (and planning for) worst-case scenarios is a legitimate task of the national security apparatus. However, for the favor of more plausible and more likely problems they should not to get more attention Therefore, there is no way to study the „actual level of cyber-risk in any sound way because it only exists in and through the representations of various actors in the political domain.