Cyber
security is the practice of protecting critical systems and sensitive
information from digital attacks. Also known as information technology (IT)
security, cyber security measures are designed to combat threats against
networked systems and applications, whether those threats originate from inside
or outside of an organization.
A strong cyber security strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an organizations or user's systems and sensitive data.
Cyber security is also instrumental in
preventing attacks that aim to disable or disrupt a system's or device's
operations.
In
this article, you will be able to explain the concept of cyber security,
describe the benefit of cyber security, explain cyber security countermeasures and explain cyberspace and cyber law.
Definition of Cyber Security?
Cyber
security is the protection of internet-connected systems such as hardware,
software and data from cyber threats. The practice is used by individuals and
enterprises to protect against unauthorized access to data centers and other
computerized systems. Maintaining cyber security in a constantly evolving
threat landscape is a challenge for all organizations.
Traditional
reactive approaches, in which resources were put toward protecting systems against
the biggest known threats, while lesser known threats were undefended, is no
longer a sufficient tactic.
To
keep up with changing security risks, a more proactive and adaptive approach is
necessary.
Several
key cyber security advisory organizations offer guidance.
For
example, the National Institute of Standards and Technology (NIST) recommend
adopting continuous monitoring and real-time assessments as part of a risk
assessment framework to defend against known and unknown threats.
Benefits of Cyber security
The
benefits of implementing and maintaining cyber security practices include
1. Business
protection against cyber-attacks and data breaches.
2. Protection
for data and networks.
3. Prevention
of unauthorized user access.
4. Improved
recovery time after a breach.
5. Protection
for end users and endpoint devices.
6. Regulatory
Compliance
7. Business
continuity.
8. Improved
confidence in the company's reputation and trust for developers, partners,
customers, stakeholders and employees.
Cyber security domains
A
strong cyber security strategy has layers of protection to defend against cybercrime,
including cyber-attacks that attempt to access, change, or destroy data; extort
money from users or the organization; or aim to disrupt normal business
operations. Countermeasures should address
1. Critical infrastructure
security
Practices
for protecting the computer systems, networks, and other assets that society
relies upon for national security, economic health, and/or public safety. The
National Institute of Standards and Technology (NIST) have created a cyber-security
framework to help organizations in this area, while the U.S. Department of
Homeland Security (DHS) provides additional guidance.
2. Network security
Practice
of securing a computer network from intruders, whether targeted attackers or
opportunistic malware
3. Application security
Processes
that help protect applications operating on-premises and in the cloud. Security
should be built into applications at the design stage, with considerations for
how data is handled, user authentication, etc.
4. Cloud security
Specifically,
true confidential computing that encrypts cloud data at rest (in storage), in
motion (as it travels to, from and within the cloud) and in use (during
processing) to support customer privacy, business requirements and regulatory
compliance standards.
5. Information security
Protects
the integrity and privacy of data, both in storage and in transit.
Operational security
Includes
the processes and decisions for handling and protecting data assets. The
permissions users have when accessing a network and the procedures that
determine how and where data may be stored or shared all fall under this
umbrella.
End-user education
Addresses
the most unpredictable cyber-security factor: people. Anyone can accidentally
introduce a virus to an otherwise secure system by failing to follow good
security practices. Teaching users to delete suspicious email attachments, not
plug in unidentified USB drives, and various other important lessons is vital
for the security of any organization.
End-user
education also helps in building security awareness across the organization to
strengthen endpoint security. For example, users can be trained to delete
suspicious email attachments, avoid using unknown USB devices, etc.
Disaster recovery /
business continuity planning
Defines
how an organization responds to a cyber-security incident or any other event
that causes the loss of operations or data. Disaster recovery policies dictate
how the organization restores its operations and information to return to the
same operating capacity as before the event. Business continuity is the plan
the organization falls back on while trying to operate without certain
resources.
Storage security
This
includes encryption and immutable and isolated data copies. These remain in the
same pool so they can quickly be restored to support recovery, minimizing the
impact of a cyber-attack.
Cyberspace
Cyberspace
refers to the virtual computer world, and more specifically, an electronic
medium that is used to facilitate online communication.
Cyberspace
typically involves a large computer network made up of many worldwide computer sub
networks that employ TCP/IP protocol to aid in communication and data exchange
activities. Cyberspace's core feature is an interactive and virtual environment
for a broad range of participants.
Cyber Laws
Cyber
laws encompass all the legal issues related to the communicative, distributive
and transactional aspects of network-related information devices and
technologies. It is different from the Property Law or any other law. Unlike
property law, it is not so distinct; it is broader since it covers several
areas of laws and regulations. It encapsulates the statutory, legal and
constitutional provisions related to computers and the internet.
Cyber
laws are related to individuals and institutions that:
•
Plays a crucial role in providing cyberspace access to people
•
Generates software and/or hardware to allow people with entry into cyberspace.
•
Make use of their computer system to gain entry into cyberspace.
Cyber Laws and Cyber
Security
In
order to ensure that humans do not misuse cyber technologies, cyber laws are
generated. The overall idea of the cyber law is to stop any person from
violating the right of other persons in cyberspace. Any kind of violation of
cyber rights is considered to be a cyberspace violation and is deemed
punishable under cyber laws. It is important to note that since cyberspace does
not belong to the physical world, the physical laws do not apply to cyberspace
crime.
A
separate set of cyber laws are formulated by the government to provide cyber
security to cyber users. Such cyber laws are needed to monitor and prevent any
immoral or illegal activities of humans. Some of the common cyberspace
violation activities include hacking, theft, money laundering, terrorism,
piracy, etc.
Hackers
can get hold of any internet account through the Domain Name Server (DNS),
phishing, IP address, etc. to get entry into the computer system of any person
and steal the data, or introduce computer bugs and render the system
ineffective.
Conclusion on Cyber Security Fundamentals, Benefits,
Cyber Space and Cyber-Law
Organizations
are finding themselves under the pressure of being forced to react quickly to
the dynamically increasing number of cyber security threats, Cyber security is
also one of the most important aspects of the fast-paced growing digital world.
The
threats of it are hard to deny, so it is crucial to learn how to defend critical
organization infrastructure.
In
this article, we have been able to define Cyber security, identify the benefits
of cyber security, explain the concept of cyber security and explain cyber
security counter measures
Frequent asked question
Define cyber security and what are the benefits of cyber security?
Answer
Cyber
security is the protection of internet-connected systems such as hardware,
software and data from cyber threats. The practice is used by individuals and
enterprises to protect against unauthorized access to data centers and other
computerized systems
Benefits of cyber security
The
benefits of implementing and maintaining cyber security practices include:
•
Business protection against cyber-attacks and data breaches.
•
Protection for data and networks.
•
Prevention of unauthorized user access.
•
Improved recovery time after a breach.
•
Protection for end users and endpoint devices.
•
Regulatory Compliance
•
Business continuity
0 Comments