CYBER
SECURITY
INTRODUCTION
The
internet has made the world smaller in many ways but it has also opened us up
to influences that have never before been so varied and so challenging. As fast as security grew, the hacking world
grew faster.
There
are two ways of looking at the issue of cyber security. One is that the
companies that provide cloud computing do that and only that so these companies
will be extremely well secured with the latest in cutting edge encryption
technology.
CYBER
SECURITY
It’s
being protected by internet-connected systems, including hardware, software and
data, from cyber-attacks. In a computing context, security comprises cyber
security and physical security both are used by enterprises to safe against
unauthorized access to data center and other computerized systems.
The
security, which is designed to maintain the confidentiality, integrity and
availability of data, is a subset of cyber security.
ADVANTAGES
OF CYBER SECURITY:
Cyber
Security provides protection against theft of data, protects computers from
theft, minimizing computer freezing, provides privacy for users, it offers
strict regulation, and it’s difficult to work with non-technical people.
v It
protects the personal and sensitive data of an individual and organizations
from being stolen.
v The
most important aspect is that it enhances the security of the system in
cyberspace.
v It
eliminates the risk of computers being hacked, thus mitigating the risk of
system freezes and crashes
v It
enhances overall security mechanisms of the business with the use of an
improved information framework and results in smooth business management
activities.
v It
protects the system against spyware, virus, malicious codes, Trojan horses,
worms, and several other unwanted infectious programs.
DISADVANTAGES
OF CYBER SECURITY:
Firewalls
can be difficult to configure correctly, faulty configured firewalls may
prohibit users from performing any behavior on the Internet before the Firewall
is properly installed, and you will continue to upgrade the latest software to
retain protection current, Cyber Protection can be expensive for ordinary
users.
v Besides,
cyber security would cost a significant number of users.
v Cyber
security can be a costly affair; as highly trained professionals are required.
v Latest
security patches must be updated regularly with the latest security
definitions, which is difficult to keep up with
EFFECTS
OF CYBER SECURITY:
v Your
company is impacted by cyber crime, A company’s lack of commitment to
information security can be very negative.
v The
direct economic impact of such attacks on companies, such as robbery of
corporate information, interruption of trade, or even the maintenance of
damaged systems, can contribute to loss of revenue.
IMPORTANCE
OF CYBER SECURITY:
Cyber
security is an important affair because of the amounts of data that is being
collected and stored over the internet and servers of the organizations.
Several significant militarizes, medical, government, corporate, industries and
financial organizations depend on the data stored on their servers
CYBER
SECURITY GOALS:
The
objective of Cyber security is to protect information from being stolen,
compromised or attacked.
Cyber
security can be measured by at least one of three goals-
Ø Protect
the confidentiality of data.
Ø Preserve
the integrity of data.
Ø Promote
the availability of data for authorized users.
WHY
WE NEED CYBER SECURITY?
The
range of operations of cyber security involves protecting information and
systems from major cyber threats. These threats take many forms. As a result,
keeping pace with cyber security strategy and operations can be a challenge,
particularly in government and enterprise networks where, in their most
innovative form, cyber threats often take aim at secret, political and military
assets of a nation, or its people. Some of the common threats are:
v Cyber
terrorism It is the innovative use of information technology by terrorist
groups to further their political agenda. It took the form of attacks on
networks, computer systems and telecommunication infrastructures.
MAINTENANCE OF EFFECTIVE CYBER SECURITY
Historically,
organizations and governments have taken a reactive, “point product” approach
to combating cyber threats, produce something together individual security
technologies – one on top of another to safe their networks and the valuable
data within them. Not only is this method expensive and complex, but news of
damaging cyber breaches continues to dominate headlines, rendering this method
ineffective
CYBER
SECURITY CAN PREVENT
The
use of cyber security can help prevent cyber-attacks, data breaches and
identity theft and can aid in risk management. When an organization has a
strong sense of network security and an effective incident response plan, it is
better able to prevent and serious
of these attacks. For example, end user
protection defends information and guards against loss or theft while also
scanning computers for malicious code.
TYPES
OF CYBER SECURITY THREATS:
v The use of keeping up with new technologies,
security trends and threat intelligence is a challenging their task. However,
it should be in order to protect information and other assets from cyber
threats, which take many forms.
v Ransom ware is a type of malware that involves
an attacker locking the victim's computer system files typically through
encryption and demanding a payment to decrypt and unlock them.
v Malware
is any file or program used to harm a computer user, such as worms, computer
viruses, Trojan horses and spyware.
THE
LEVEL OF CYBER RISK
There
are some additional reasons for that threat is overrated. First, as combating
cyber-threats has become a highly politicized issue, official statements about
the level of threat must also be seen in the context of different bureaucratic
entities that compete against each other for resources and influence. This is
usually done by stating an urgent need for action (which they should take) and
describing the overall threat as big and rising. Second, psychological research
has shown that risk perception is highly dependent on intuition and emotions,
as well as the perceptions of experts (Gregory and Mendelssohn 1993).
Cyber-risks, especially in their more extreme form, fit the risk profile of
so-called „dread risks‟, which appear
uncontrollable, catastrophic, fatal, and unknown.
REDUCING
CYBER – IN - SECURITY
The
three different debates have been taken over the many concepts and counter
measures have been produced with their focus.
The computer network which owns an entity has a common practice to take
a responsible for protecting it. However, there are some assets considered so
crucial in the private sector to the functioning of society and governments
have to take additional measures to ensure the level of protection. These
efforts are usually included under the label of critical (information).
Information assurance is guide for the infrastructure protection and to the
management of risk, which is essentially about accepting that one is (or
remains) insecure: the level of risk can never be reduced to zero.
CONCLUSION
Depending
on their (potential) severity, however, disruptive incidents in the future will
continue to fuel the military discourse, and with it fears of strategic
cyber-war. Certainly, thinking about (and planning for) worst-case scenarios is
a legitimate task of the national security apparatus. However, for the favor of
more plausible and more likely problems they should not to get more attention
Therefore, there is no way to study the „actual‟
level of cyber-risk in any sound way because it only exists in and through the
representations of various actors in the political domain.