Since the birth of the Internet, many changes have come in our lives. While internet has proved to be very beneficial for us, but many things related to it have also come to the fore which can be dangerous for us. It is seen a lot on the Internet by many people stealing someone's information or taking wrong advantage of information by some techniques. Today we will talk about such topics on cyber security or cyber security. Let us know what is cyber security and why do we need to know it so much?
What is Cyber Security
Before knowing about cyber security, we should understand that what is cyber security? Cyber refers to computers or networks connected to computers such as the Internet. Now you must have got an idea of what cyber security is.
Cyber security is a process in which work is done to keep computers, networks, servers, mobile devices, electronic systems etc. In more simple words, cyber security is to protect every device connected to the Internet network from any external or internal attacks. These attacks can be anything such as stealing personal information, misusing data or destroying important data forever.
Types of Cyber Security
There can be different types of cyber security to prevent different types of cyber attacks, let us know about some of the main types of cyber security
I. Infrastructure Security
The security we are most aware of till now is called infrastructure security. Infrastructure security means that the things, information and resources that we have with us are not allowed to be misused by any other person. Security of number plate information etc of all vehicles in your city comes under infrastructure security.
Just think about it, in the age of internet, when data from traffic lights to hospital patients is available in the computer, if it falls into the wrong hands. Even a small thing can make a big difference that is why there is so much emphasis placed on this infrastructure security.
Infrastructure security means protecting us and our government or country from misuse of information related to the country at any cost so that our infrastructure can be safe.
II. Network Security
Network security refers to protecting the computer network from internal or external attacks. In a big company, it becomes more important to pay attention to network security because there the computer is connected to many other computers, with the help of which many websites are viewed on the Internet. If the hacker sent a single virus to a computer through the Internet, then it would affect the complete work of the company.
Therefore, it is necessary to take some necessary steps in advance to protect the network from external attacks. To improve network security, nowadays companies are paying a lot of attention to machine learning because the more machines are known, the easier it will be to avoid any threat.
Some examples of implementing network security are seen such as –
• Keeping new and difficult passwords
• Change the password regularly
• Extra Logging
• Operating an antivirus program
• Using the Firewall
• Monitoring Internet access etc.
III. Application Security
The security that needs the most attention nowadays is application security. It is very important to resort to application security to keep your system safe from cyber attacks.
Applications are used extensively in our computers and many other devices and these applications become very vulnerable to cyber attacks. While building the application or in some other way, some people put such flaws or viruses in these applications which can steal or erase all our information.
In view of this, application security is used, in which with the help of hardware and software technology, external cyber threats are analyzed. Which shows that no virus etc. has been inserted during the creation process of the application.
The application is the most widely used system on the network, due to which the adoption of security rules is an essential step in its development. There are some types of application security
• Firewall
• Antivirus programs
• Encryption Programs
All these application protections ensure that any unauthorized access is blocked.
IV. Cloud Security
You must have also noticed that the security which is increasing in demand nowadays is cloud security. Now the time has come when we consider it better to keep our data not at home but on the internet. Keeping the data secure with the help of any software and site on the internet not only frees us from its theft, but we can access this data anywhere at any time.
So much emphasis is placed on cloud security to protect the data or information on cloud resources. Cloud security is a software defined security tool that monitors and protects the data contained in your cloud resources.
The companies providing cloud security services make every effort to keep the data secret, yet many people believe that it is better to keep the important data in a locker or secret place with them. It is also logical for the people to think because every day there are cyber attacks on not many cloud storage sites. Yet cloud resources are being improved day by day.
V. Internet of Things (IoT) Security
Internet of Things security focuses on the most important and least essential physical systems. Nowadays we go to any mall, there are a lot of security cameras installed.
We read in the newspapers or keep hearing in the news that there was a cyber attack on that institution of that country or a cyber attack on any important social media site. We hear about this, but very few people know what a cyber attack is. For your information, let me tell you that cyber attacks can happen on you or anyone, and they keep happening on us
Stealing or misusing any information through the Internet from your computer or computer network, mobile and electronic devices etc. is called cyber attack. Suppose a message comes in your mobile in which a link is given, you click on that link. By clicking on that link, some money or all the money is stolen from your bank account, this type of incident comes under cyber attack. Social media account hacked. Hacking of banking systems is also a form of cyber attack.
Hope you have fully understood the definition of cyber attack. Let us now know how many types of cyber attacks are there.

0 Comments