INTRODUCTION � Cyber security is the practice of protecting systems, networks or programs from digital attacks.� � These cyber-attacks are usually aimed at accessing, changing or destroying sensitive information, extorting money from users or interrupting normal business processes. � � All types of organizations such as medical, financial, and educational institutions use this network to operate effectively.� � �.
INTRODUCTION � Cyber security is the practice of protecting systems, networks or programs from digital attacks.� � These cyber-attacks are usually aimed at accessing, changing or destroying sensitive information, extorting money from users or interrupting normal business processes. � � All types of organizations such as medical, financial, and educational institutions use this network to operate effectively.� � �.
They utilizethenetworkbycollecting, processin, storing and sharing vast amounts of digital information.� � As more digital information is gathered and shared, the protection of this information is becoming even more vital to our national security and economic stability.� � Cybersecurity is an on going effort to protect the network, system and all the data from unauthorized use or harm. On a personal level you need to safeguard your identity and your computing devices. �.
NEED OF CYBER SECURITY � Cybersecurity is important across different sectors such as government organizations, startups, mid and large enterprises and even for personal use. Gone are the days of simple firewalls and antivirus softwares being our sole security measures.� Cybersecurity risk is increasing and without its help, the organization cannot defend itself against data breach campaigns.With the increase in the rate of cyber crime, cyber security has gained a huge importance in the society.� �.
� � Network Security� Network security is the process of taking precautionary measures to protect the devices from unauthorized access, modification, or destruction.� Need of Network Security� The organization's ability to function without any interference. For enabling safe operation in the IT system of any organization. To protect the data collected by the organization for their internal use.� Information Security: Information security, also known as infosec is the process of securing data from any kind of violations in the form of theft, abuse or loss.�.
Information security is based on three main aspects of data security referred to as the CIA namely confidentiality, integrity, and availability� Need of Information Security� To protect the functionality of the organization� To ensure safe operation of application � To protect the data collected by the organization.� Application Security: Application security is the process of increasing security of web and mobile applications to protect the data from attackers.� Need of Application Security� To improve the trust among users� To protect sensitive data� To maintain the reputation of the brand To secure user data from data breach.� Cloud Security: Cloud security is defined as a set of policies and procedures that mainly aims at protecting cloud-based applications and systems.� Need of Cloud Security� Most of the companies have decided to migrate their data, applications and other assets to the cloud, now it is very essential to protect this sensitive information that could potentially be exposed.� Security professionals are more concerned about cloud security in their organization as data leaks can damage customer's trust.� Internet of Things Security, IOT Security is the process of protecting IOT devices from vulnerabilities.� Need of Internet of Things Security� IOT devices have to be secure to exchange data. If one device is hacked, the entire network is at risk as all the devices are inter-linked.�.
Mottile Security: Mobile security is the protection of smartphones, tablets and other various devices from vulnerabilities,� Need of Mobile Security To protect private tlata� To prevent ourselves from being vulnerable to virus attacks� To delete sewative dare automatically in case of mobile theft. To prevent malvertising� CYBER THREATS� A cybersecurity threat is the threat of a malicious attack by an individual or organization attempting to gain access to a computer network, corrupt data, or steal confidential information.� Some common forms of cybersecurity are as follows:-� Phising Phising is a form of scam where attackers service people into revealing sensitive information or stalling malware sentence such as rosenworm. Fishing attacks have become increasingly sophisticated and often transparently mirrored the site being targeted, allowing the attackers to observe everything while the victim is navigating the site and transfers any additional security boundaries with the victim.� RansomwareRansomware is a type of malware from the cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a random ransom is paid off. While some simple ransomware may lock the system without damaging any file, more advanced malware user technique called cryptoviral extortion. It encrypts the victims' fires, making them inaccessible and demands a ransom payment to encrypt them.� Denial of Service (DIOS)- DIOS attack or a Denial-of-service attack is when a computer sends a massive amount of traffic to the victim's computer and shuts it down. It is an online attack that is used to make the websites unavailable for its user when done on a website. This attack on the server of a website that is connected to the Internet by sending a large of traffic to it.�.
Autonuttic trailer machine (ATM)-Automated trailer machine (ATM), Cash out. It isa Dye of hirge dollar value ATM fraud cash out involves simultaneous large cash withdrawals from several ATMs in many regiona. It may also include large withdrawals Spamming Spamming occurs when someone receives an unsolicited commercial mosage sem via e -mail, SMS, MMS and any other similar electronic messaging media.. They may ay te persuade the recipient to buy a product or service or visit a website� one ATM� where he van make purchase, or they amay attempt to trick him/her into divulging bank Virus-Computer vinus is a program returned to enter to your computer and damage alter your files data and replicate them.� sccount or credit card details� Worms-Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, c� Trojan-trojan horse is not a virus. It is a destructive program that looks as a genuine� application. Unlike viruses trojan buries do not replicate themselves but they can he just destructive trojans open up backdoor entry to your computer which gives malicious seer programmers access to your computer allowing confidential and personal information to be theft. Online job fraud-Online job fraud is an attempt to defraud people who are in need of� employment by giving them a false hope of better employment with higher wages� CYBER SECURITY MEASURES� processes atnid theils are fairly easy to introduce and combined, they will level of security against the most common IT risks, the you a baik� The fallen aty� Use strong passwords� Son passwords are� sital to good moline security. Make your password difficult to guess� wing a combination of capital and lower-case letters, numbers and symbols�.
making it het oor eight and 12 characters long assording the use sel pemunal dina� changing it regularly� uving two-factor authentication� Crom password policy for your business to help mall lollew security hest practices Look into differem technology solutions to enfiance your password policy, eg scheduled pasowoni neset. For detailed guidance on passwords, wad the National Cyber Security� Contra (NCSC) guide on ning puisse ard to protect your data ind consider paward Mrategies, that could boost your business security.� Control access to data and systems� Make sure that individuah can only access data and services for which they are autorid For example, you can� physical access to premises and computers network� control restnut access to unauthorised users� lamit acess to data or services through application controls textinct what can� be copied from the systems and saved to storage devices funit seliding and receiving of certain types of email attachments� Modem operating synes and network software will help you to achieve most of this but you will need to manage the registration of amers and user authentication systems-eg For more information, read NCNC's introduction to identity and access� Put up a firewall� Firewalls are effectively gatekeepers hetween your computer and the internet. They act as a harrier to prevent the spread of cyber threats such as viruses and malware. It's important 10 set up firewall devices properly and check them regularly to ensure their software/firmware is up to date, or they may not be fully effective. Read more about firewalls in server security� Use security software� You should ase security software, such as anti-spyware, anti-malware and anti-virus programs, to help detect and remove malicious code if it slips into your network. See our detailed guidance to help you detect spam, malware and virus attacks.�.
Update programs and systems regularly� Updates contain vital security upgrades that help protect against known bugs and vulnerabilities. Make sure that you keep your software and devices up-to-date to avoid falling prey to criminals.� You can use intrusion detectors to monitor systems and unusual network activity. Ifa detection system suspects a potential security breach, it can generate an alarm, such as an email alert, based on the type of activity it has identified. See more on cyber security breach detection.� Raise awareness� Monitor for intrusion� Your employees have a responsibility to help keep your business secure. Make sure that they understand their role and any relevant policies and procedures, and provide them with regular cyber security awareness and training. Read about insider threats in cyber security.� You should also follow best practices defined in the government's Cyber Essentials scheme. You can use the National Cyber Security Centre's (NCSC) free Check your cyber security service in perform a range of simple online checks to identify common vulnerabilities in your public- facing IT. The NCSC also offer a free Cyber Action Plan. By answering a few simple questions, you can get a free personalised action plan that lists what you can do to protect against cyber attack.� CYBER SECURITY TOOLS AND TECHNOLOGIES� Protecting our IT emirenment is very critical. Every organization needs to take cybersecurity very survously. There are mumber of hacking attacks which affecting�.
bine of oill sizes. Hackers, malware, viruses are some of the real security threats in the real world. It is essential that every company is aware of the dangerous security attles and it is necessary to keep themselves secure.� Network Intrusion Detection� To Improve protection against malicious IP traffic on their networks, organizations often use intrusion detection and protection systems (IDPS) to safeguard against threats that may penetrate their firewalis. Intrusion detection systems (IDS) use software to automate the detection process and intrusion protection systems (IPS) use software to detect and atempt to deter potential data breaches. Once a malicious pattern or violation is detected, the IDS alerts the system administrators so they may take appropriate action. The IPS analyzes IP traffle and blocks malicious traffic, thereby preventing an attack.� According to the National Institute of Standards and Technology (NIST), there are 4 classifications of IDPS technologies:� Network-based: These IDPS technologies monitor network traffic for particular network segments or devices and analyze the network and application protocol activity� to identify suspicious activities.� Wireless: Wireless IDPS technologies monitor and analyze traffic on wireless networks to identify suspicious activity involving wireless networking protocols.� Network behavior analysis (NBA): NBA examines network traffic to identify threats generating unusual raffic flows, such as distributed denial of service (DDoS) attacks or certain forms of malware.� Host-based: Host-based IDPS technologies monitor the characteristics of a single host (a PC or server, for example) and the events occurring within that host for suspicious activity.� Virtual Private Networks (VPN)� A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely transmitted. It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct work remotely. A VPN extends a corporate network through�.
cncrypted connections made over the internet. Because the traffic is encrypted between the device and the nerwork, traffic remains private as it imvels. An employee can work outside the office and still securely connect to the corporate network. Even smartphones and tablets can connect through a VPN.� Secare reinole access provides a safe, secure way to connect users� and devices remotely to a corporate network. It includes VPN technology that uses strong� ways to authenticate the user or device. VPN technology is available to check whether a� device meets certain requirements, also called a device's posture, before it is allowed to connect remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a tunnel. VPN traffic from a device such as a computer, tablet, or smartphone is encrypted as it travels through this tunnel. Offsite employees can then use the virtual network to access the corporate network.� Security Information and Event Managment (SIEM)� Security information and event management, or SIEM, is a security solution that helps organizations recognize and address potential security threats and vulnerabilities before they have a chance to disrupt business operations. SIEM systems help enterprise security teams detect user behavior anomalies and use artificial intelligence (Al) to automate many of the manual processes associated with threat detection and incident response.� Endpoint protection solutions� Endpoint protection software provides security solutions to oversee and manage devices that have access to a company's or person's private network. These software tools protect against a number of security threats and attempt to normalize security measures across multiple devices.IT system administrators are given a central console that allows them to endpoints connecting to a specific network. Administrators are provided with a of security mechanisms to o protect against attacks, hacks, and zero-day attacks. among other threats. These applications provide a variety of safeguarding tools such as antivirus, firewall or virtual private networking. Endpoint security tools provide a simplified, centralized interface to monitor and deploy devices connected to a network. From the main management console, administrators can view nearly all of their network infrastructure, depending on the endpoint security product. They are also able to view activity, create reports, and run system scans to continuously protect against any and all thecats that may arise.�.