Cyber security is the practice in which protection of systems, networks, and programs from digital attacks is done. It's also referred to as information technology security/electronic information security. The cyber-attacks are aimed at accessing, changing, destroying sensitive information or interrupting normal business processes. Cyber security basically consists of technologies, processes and controls designed for the protection of systems, networks, programs, devices and data from cyber-attacks.
What we do?
When any organization transmit sensitive data across networks and to other devices for the course of businesses, our company provides cyber security services that are dedicated to protecting that information and the systems used to process or store it. Those services are available to help prevent cyber-attacks, data breaches and identity theft and can aid in risk management.
Elements of Cyber security:
Activity designed to protect the usability, reliability, security and integrity of network and data. Hardware and software technologies both are included in it. Effective network security manages access to the network. Different types of threats are targeted by Network security and stop them from entering or spreading on your network.
Network security components include: a) Anti-spyware and anti-virus, b) Firewall: Unauthorized access blocked c) Intrusion prevention systems (IPS) : Identifies fast-spreading threats) d) Virtual Private Networks (VPNs): Provides secure remote access.
To keep software and devices free of threats, application security is used. A main part of Successful security begins in the design stage. Application security considers the measures that are taken during the development cycle to protect applications from threats. Techniques used for application security are: a) Input parameter validation b) User/Role Authentication & Authorization c) Session management, parameter manipulation & exception management d) Auditing and logging.
Protection of integrity and privacy of data, both in storage and transit is done with the Information security. It also protects information from unauthorized access to avoid identity theft.
Techniques used for Information security are: a) Identification, authentication & authorization, b) Cryptography.
For handling and protecting data assets, operational security includes the processes and decisions. It is risk management process which encourages managers from the perspective of adversary to protect sensitive information.
Steps involved in operational security: a) Identify your sensitive data b) Identify possible threats c) Analyze security holes d) Appraise the level of risk e) Get counter measures.
Disaster recovery/business continuity:
Disaster recovery defines how an organization responds to a cyber-security incident. A disaster recovery policy shows how the restoration of operations and information can be done to return to the same operating capacity as before the event. Business continuity ensures that personnel and assets are protected and are able to function quickly in the event of a disaster. In case of Disaster, Disaster recovery planning provides risk assessment, establishing priorities, developing recovery strategies. All business should have a plan for disaster recovery to continue their normal business operations after a disaster as soon as possible.
End-user education security:
It addresses the most unpredictable cyber-security factor: people. Its an accidentally introduced virus to secured system by failing to follow good security practices. User should have basic knowledge about deleting suspicious email attachments, not plug in unidentified USB drives etc.
The threats countered by cyber-security are three-fold:
2. Cyber attack
2. Cyber terror
Types of cyber security threats:
a) Ransom ware is a type of malware that focus on a criminal business model that installs malicious software on a device and holds valuable files, data, or information ransom. It normally involves an attacker locking the computer system files of victim through encryption and then demanding a payment to decrypt and unlock them. It is the largest threat organizations facing today because of its low barrier to entry and high revenue potential.
b) Malware is a type of software created for damaging the user's computer by stealing private information without the consent of the user. Types of malware include worms, computer viruses, Trojan horses and spyware. Malicious code spreads through unsolicited email attachment or a legitimate-looking download that carries a malware payload. Viruses and worms can self-replicate themselves and damage files, spyware and Trojans are often used for surreptitious data collection. Electronic security protocols focus on real-time malware detection.
c) Social engineering is an attack that relies on human interaction to trick users into breaking security procedures in order to gain sensitive information that is typically protected.
d) In Phishing, the fraudulent emails are sent that matches with the emails from reputable source. Theintention are to steal sensitive data, such as credit card or login information.
Why is cyber security important?
a) Cyber security breaches cost is rising b) Cyber-attacks grows in sophistication c) Cyber-crime has a big business d) Cyber security is a board-level issue