Document
Document
Document
Cyber Security is the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, theft, damage, modification or unauthorized
access. It’s also known as Information Security (INFOSEC), Information Assurance (IA), or
System Security.
Why Cybersecurity?
Cyber Security is important because the government, Corporate, medical organizations, collect
military, financial, process, and store the unprecedented amount of data on a computer and other
properties like personal information, and these private information exposure could have negative
consequences.
Cyber Security proper began in 1972 with a research project on ARPANET (The Advanced
Research Projects Agency Network), a precursor to the internet. ARPANET developed protocols
for remote computer networking. Example – If we shop from any online shopping website and
share information like email id, address, and credit card details as well as saved on that website
to enable a faster and hassle-free shopping experience, then the required information is stored on
a server one day we receive an email which state that the eligibility for a special discount
voucher from XXXXX (hacker use famous website Name like Flipkart, Amazon, etc.) website to
receive the coupon code, and we will be asked to fill the details then we will use saved card
account credentials. Then our data will be shared because we think it was just an account for the
verification step, then they can wipe a substantial amount of money from our account.
That is why Cyber Security provides services as a Security Gate-Way to make information more
Secure; in today’s time, hackers are advanced. We can’t surely say whether the data stored in my
Devices is safe from outside threats. With Cybercrime increasing rapidly, it’s crucial to have
Cyber Security in place in our personal life and our Business.
Types of Cybersecurity:
1. Network Security –
Focuses on securing computer networks from unauthorized access, data breaches, and other
network-based threats. It involves technologies such as Firewalls, Intrusion detection systems
(IDS), Virtual private networks (VPNs), and Network segmentation.
Guard your internal network against outside threats with increased network security.
Sometimes we used to utilize free Wi-Fi in public areas such as cafes, Malls, etc. With this
activity, 3rd Party starts tracking your Phone over the internet. If you are using any payment
gateway, then your bank account can be Empty.
So, avoid using Free Network because free network Doesn’t support Securities.
2. Application Security –
Concerned with securing software applications and preventing vulnerabilities that could be
exploited by attackers. It involves secure coding practices, regular software updates and patches,
and application-level firewalls.
Most of the Apps that we use on our Cell-phone are Secured and work under the rules and
regulations of the Google Play Store.
There are 3.553 million applications in Google Play, Apple App Store has 1.642 million, while
Amazon App Store has 483 million available for users to download. When we have other
choices, this does not mean that all apps are safe.
Many of the apps pretend to be safe, but after taking all information from us, the app share the
user information with the 3rd-party.
The app must be installed from a trust-worthy platform, not from some 3rd party website in the
form of APK (Android Application Package).
3. Information or Data Security:
Focuses on protecting sensitive information from unauthorized access, disclosure, alteration, or
destruction. It includes Encryption, Access controls, Data classification, and Data loss prevention
(DLP) measures.
Incident response refers to the process of detecting, analyzing, and responding to security
incidents promptly.
Promoting security awareness among users is essential for maintaining information security. It
involves educating individuals about common security risks, best practices for handling sensitive
information, and how to identify and respond to potential threats like phishing attacks or social
engineering attempts.
Encryption is the process of converting information into an unreadable format (ciphertext) to
protect it from unauthorized access.
4. Cloud Security –
It involves securing data, applications, and infrastructure hosted on cloud platforms, and
ensuring appropriate access controls, data protection, and compliance. It uses various cloud
service providers such as AWS, Azure, Google Cloud, etc., to ensure security against multiple
threats.
Cloud base data storage has become a popular option over the last decade. It enhances privacy
and saves data on the cloud, making it accessible from any device with proper authentication.
These platforms are free to some extent if we want to save more data than we have to pay.
AWS is also a new Technique that helps to run your business over the internet and provides
security to your data
5. Mobile Security –
It involves securing the organizational and personal data stored on mobile devices such as cell
phones, tablets, and other similar devices against various malicious threats. These threats are
Unauthorized access, Device loss or Theft, Malware, etc.
Mobile is the very common device for day to day work. Everything we access and do are from
mobile phone. Ex- Online class, Personal Calls, Online Banking, UPI Payments, etc.
Regularly backing up mobile device data is important to prevent data loss in case of theft,
damage, or device failure.
Mobile devices often connect to various networks, including public Wi-Fi, which can pose
security risks. It is important to use secure networks whenever possible, such as encrypted Wi-Fi
networks or cellular data connections.
6. Endpoint Security:
Refers to securing individual devices such as computers, laptops, smartphones, and IoT devices.
It includes antivirus software, intrusion prevention systems (IPS), device encryption, and regular
software updates.
Antivirus and Anti-malware software that scans and detects malicious software, such as Viruses,
Worms, Trojans, and Ransomware. These tools identify and eliminate or quarantine malicious
files, protecting the endpoint and the network from potential harm.
Firewalls are essential components of endpoint security. They monitor and control incoming and
outgoing network traffic, filtering out potentially malicious data packets.
Keeping software and operating systems up to date with the latest security patches and updates is
crucial for endpoint security.
5. Critical Infrastructure Security-
All of the physical and virtual resources, systems, and networks that are necessary for a society’s
economics, security, or any combination of the above to run smoothly are referred to as critical
infrastructure. Food and agricultural industries, as well as transportation systems, comprise
critical infrastructure.
The infrastructure that is considered important might vary depending on a country’s particular
demands, resources, and level of development, even though crucial infrastructure is comparable
across all nations due to basic living requirements.
Industrial control systems (ICS), such as supervisory control and data acquisition (SCADA)
systems, which are used to automate industrial operations in critical infrastructure industries, are
frequently included in critical infrastructure. SCADA and other industrial control system attacks
are very concerning. They have the capacity to seriously undermine critical infrastructure,
including transportation, the supply of oil and gas, electrical grids, water distribution, and
wastewater collection.
Due to the links and interdependence between infrastructure systems and sectors, the failure or
blackout of one or more functions could have an immediate, detrimental effect on a number of
sectors.
7. Internet of Things (IoT) Security-
Devices frequently run on old software, leaving them vulnerable to recently identified security
vulnerabilities. This is generally the result of connectivity problems or the requirement for end
users to manually download updates from a C&C center.
Manufacturers frequently ship Internet of Things (IoT) devices (such as home routers) with
easily crackable passwords, which may have been left in place by suppliers and end users. These
devices are easy targets for attackers using automated scripts for mass exploitation when they are
left exposed to remote access.
APIs are frequently the subject of threats such as Man in the Middle (MITM), code injections
(such as SQLI), and distributed denial of service (DDoS) attacks since they serve as a gateway to
a C&C center. You can read more about the effects of attacks that target APIs here.
Why is Cybersecurity Important?
Cybersecurity is essential for protecting our digital assets, including sensitive personal and
financial information, intellectual property, and critical infrastructure. Cyberattacks can have
serious consequences, including financial loss, reputational damage, and even physical harm.
Cyber security is vital in any organization, no matter how big or small the organization is. Due to
increasing technology and increasing software across various sectors like government, education,
hospitals, etc., information is becoming digital through wireless communication networks.
The importance of cyber security is to secure the data of various organizations like email, yahoo,
etc., which have extremely sensitive information that can cause damage to both us and our
reputation. Attackers target small and large companies and obtain their essential documents and
information.
Cybersecurity has become increasingly important in today’s interconnected world. As more and
more data is stored and transmitted electronically, the risk of cyber attacks has also increased.
Cybersecurity is the practice of protecting computer systems, networks, and data from theft,
damage, or unauthorized access.
Importance of Cybersecurity:
Protecting Sensitive Data:
With the increase in digitalization, data is becoming more and more valuable. Cybersecurity
helps protect sensitive data such as personal information, financial data, and intellectual
property from unauthorized access and theft.
Preserving Privacy:
In an era where personal information is increasingly collected, stored, and shared digitally,
cybersecurity is crucial for preserving privacy. Protecting personal data from unauthorized
access, surveillance, and misuse helps maintain individuals’ privacy rights and fosters trust in
digital services.
Challenges of Cybersecurity:
Constantly Evolving Threat Landscape:
Cyber threats are constantly evolving, and attackers are becoming increasingly sophisticated.
This makes it challenging for cybersecurity professionals to keep up with the latest threats and
implement effective measures to protect against them.
Lack of Skilled Professionals:
There is a shortage of skilled cybersecurity professionals, which makes it difficult for
organizations to find and hire qualified staff to manage their cybersecurity programs.
Limited Budgets:
Cybersecurity can be expensive, and many organizations have limited budgets to allocate
towards cybersecurity initiatives. This can result in a lack of resources and infrastructure to
effectively protect against cyber threats.
Insider Threats:
Insider threats can be just as damaging as external threats. Employees or contractors who have
access to sensitive information can intentionally or unintentionally compromise data security.
Complexity of Technology:
With the rise of cloud computing, IoT, and other technologies, the complexity of IT infrastructure
has increased significantly. This complexity makes it challenging to identify and address
vulnerabilities and implement effective cybersecurity measures.
Continuous Monitoring:
Continuous monitoring of IT infrastructure and data can help identify potential threats and
vulnerabilities, allowing for proactive measures to be taken to prevent attacks.
Use strong passwords: Use unique and complex passwords for all of your accounts, and consider
using a password manager to store and manage your passwords.
Keep your software up to date: Keep your operating system, software applications, and security
software up to date with the latest security patches and updates.
Enable two-factor authentication: Enable two-factor authentication on all of your accounts to add
an extra layer of security.
Be wary of suspicious emails: Be cautious of unsolicited emails, particularly those that ask for
personal or financial information or contain suspicious links or attachments.
Educate yourself: Stay informed about the latest cybersecurity threats and best practices by
reading cybersecurity blogs and attending cybersecurity training programs.
Conclusion: Cybersecurity is an essential part of our digital lives, protecting our personal and
professional assets from cyber threats. By understanding the types of cyber threats, taking
proactive steps to protect yourself, and staying informed about the latest best practices, you can
help ensure the safety and security of your digital assets.
32
Previous
Difference between Block Cipher and Transposition Cipher
Next
Data encryption standard (DES) | Set 1
Share your thoughts in the comments
Prateektyagibca2018
Article Tags :
Cyber-security
Computer Networks
School Learning
Geeksforgeeks-footer-logo
A-143, 9th Floor, Sovereign Corporate Tower, Sector-136, Noida, Uttar Pradesh – 201305
GFG App on Play Store
GFG App on App Store
Company
About Us
Legal
Careers
In Media
Contact Us
Advertise with us
GFG Corporate Solution
Placement Training Program
Explore
Hack-A-Thons
GfG Weekly Contest
DSA in JAVA/C++
Master System Design
Master CP
GeeksforGeeks Videos
Geeks Community
Languages
Python
Java
C++
PHP
GoLang
SQL
R Language
Android Tutorial
Tutorials Archive
DSA
Data Structures
Algorithms
DSA for Beginners
Basic DSA Problems
DSA Roadmap
Top 100 DSA Interview Problems
DSA Roadmap by Sandeep Jain
All Cheat Sheets
Data Science & ML
Data Science With Python
Data Science For Beginner
Machine Learning Tutorial
ML Maths
Data Visualisation Tutorial
Pandas Tutorial
NumPy Tutorial
NLP Tutorial
Deep Learning Tutorial
HTML & CSS
HTML
CSS
Web Templates
CSS Frameworks
Bootstrap
Tailwind CSS
SASS
LESS
Web Design
Django Tutorial
Python Tutorial
Python Programming Examples
Python Projects
Python Tkinter
Web Scraping
OpenCV Tutorial
Python Interview Question
Computer Science
Operating Systems
Computer Network
Database Management System
Software Engineering
Digital Logic Design
Engineering Maths
DevOps
Git
AWS
Docker
Kubernetes
Azure
GCP
DevOps Roadmap
Competitive Programming
Top DS or Algo for CP
Top 50 Tree
Top 50 Graph
Top 50 Array
Top 50 String
Top 50 DP
Top 15 Websites for CP
System Design
High Level Design
Low Level Design
UML Diagrams
Interview Guide
Design Patterns
OOAD
System Design Bootcamp
Interview Questions
JavaScript
JavaScript Examples
TypeScript
ReactJS
NextJS
AngularJS
NodeJS
Lodash
Web Browser
Preparation Corner
Company-Wise Recruitment Process
Resume Templates
Aptitude Preparation
Puzzles
Company-Wise Preparation
School Subjects
Mathematics
Phy