cyber security

Reading Time: < 1 minute
Read Previous post!
Read Next post!

Introduction of ‘Cyber Security’

  Definition: Cybersecurity or information technology security is techniques to protect computers, networks, programs and data from unauthorized access or exploitation.

  Description: Key areas covered in cyber security include:

  1) Application security

  2) Information security

  3) Disaster recovery

  4) Network security

  Application security includes actions or countermeasures taken during the development lifecycle to protect applications from threats that may come from shortcomings in application design, development, deployment, upgrade or management. Some basic techniques used for application security are: a) input parameter validation, b) user / role visualization and visualization, c) session management, parameter manipulation and exception management, and d) auditing and logging.

  Information security protects information from unauthorized access to avoid identity theft and to protect privacy. The main techniques used to compensate for this are: a) user identification, visualization and visualization, b) cryptography.

  A disaster recovery plan is a process of managing risk assessment, establishing priorities, and developing recovery strategies in the event of a disaster. Any business should have a vision plan for disaster recovery to resume normal business operations after a disaster.

  Network security includes activities that protect the usability, reliability, integrity and security of the network. Effective network security targets a variety of threats and prevents them from accessing or spreading the network. Network security components include: a) anti-virus and anti-spyware, b) firewall, to block unauthorized access to your network; Attacks and d) Virtual Private Networks (VPNs).

Read Previous post!
Read Next post!