Cyber Security

Cyber Security

Cyber Security

Or (Cyber security) . The term is also known as Information Technology Security or Electronic Information Security . The practices and procedures used to protect computer devices, servers, phones, electronic systems, networks, and databases from malicious attacks.

Cyber Security
Cyber Security

Fields of application of cyber security

These practices can be applied within many contexts, starting from the business context to the field of telephone computing, and accordingly, cybersecurity is divided into a group of categories or fields , and the following is an explanation of the most prominent of them:

  • Network Security: It is the practices followed to protect a computer network from intrusive parties, whether the attack was launched by targeted parties or opportunistic malicious programs.
  • Application Security: These are practices that focus on protecting software and hardware from malicious attacks, as successful security measures start from the design stage, before the program or device is launched and used.
  • Information Security: These are practices that aim to protect the integrity and privacy of data when it is stored or transmitted.
  • Operational Security: It refers to the mechanisms and decisions put in place to protect data assets. All permissions granted to users when entering the network and the various actions taken that determine the way data is stored and how it is shared fall into this category.
  • Disaster Recovery and Business Continuity Policies : These practices define how a company will respond when it is exposed to a cyber-security attack or any other event that causes data loss or disrupts its operations.Where disaster recovery policies explain how a company can return to its normal operation and how it retrieves its stored information, to be able to return to its same operating capacity prior to the event, while business continuity policies refer to the plans on which the company is based to try to operate without the presence of specific resources.
  • End-user Education: The practices and procedures concerned with addressing unexpected factors and elements that negatively affect the security system, whereby any user can inadvertently transfer viruses and malicious computer programs to a secure system, due to not following the correct security practices. .For this reason, this category of security practices aims to educate users, such as urging them to delete suspicious emails and not insert hard drives or connect unidentified USB devices, and many other important lessons necessary to ensure the security of the company.



Leave a Reply

%d bloggers like this: