CYBER SECURITY

Posted by on July 21, 2020

CYBER SECURITY

Computer securitycybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardwaresoftware, or electronic data, as well as from the disruption or misdirection of the services they provide.

The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of “smart” devices, including smartphonestelevisions, and the various devices that constitute the “Internet of things“. Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.

A vulnerability is a weakness in design, implementation, operation or internal control. Most of the vulnerabilities that have been discovered are documented in the Common Vulnerabilities and Exposures (CVE) database. An exploitable vulnerability is one for which at least one working attack or “exploit” exists. Vulnerabilities are often hunted or exploited with the aid of automated tools or manually using customized scripts.

Also referred to as information security, cybersecurity refers to the practice of ensuring the integrity, confidentiality, and availability (ICA) of information. Cybersecurity is comprised of an evolving set of tools, risk management approaches, technologies, training, and best practices designed to protect networks, devices, programs, and data from attacks or unauthorized access.

Network Security protects network traffic by controlling incoming and outgoing connections to prevent threats from entering or spreading on the network.

Data Loss Prevention (DLP) protects data by focusing on the location, classification and monitoring of information at rest, in use and in motion.

Cloud Security provides protection for data used in cloud-based services and applications. 

Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS) work to identify potentially hostile cyber activity.

Identity and Access Management (IAM) use authentication services to limit and track employee access to protect internal systems from malicious entities.

Encryption is the process of encoding data to render it unintelligible, and is often used during data transfer to prevent theft in transit.

Antivirus/anti-malware solutions scan computer systems for known threats. Modern solutions are even able to detect previously unknown threats based on their behavior.

CategoriesUncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *

AXONTEC
Security Solutions (P)LTD
DD MILESTONE BUILDING
KADAVANTRA KOCHI-20
+91 9400274442, +91 4822274442

🎃
COPYRIGHT @ AXONTEC SECURITY SOLUTIONS | POWERED AND DEVELOPED BY ZINAM TECHNOLOGIES | PRIVACY POLICY - ALL RIGHTS RESERVED