Cyber Security Tutorial

Cyber Security Overview Cyber Security Introduction Cyber Crime Cyber Space Cyber Criminals Cyber Law Cyber Attackers Types of Hackers Functions of Cyber Security Method to Improve Data Security Cyber security frameworks Importance of Cyber Security Types of Cyber Security Cyber Security Fundamentals Applications of cyber security Cyber security in education sector Cyber security in health care industry Cyber security tools Cyber security policies Types of security policies Characteristics of cyber security policies Digital signature Cyber Security Standards NIST- National Institute of Standard and technology Information Technology Act ISO - International Standard for Organization ISO certification PCI DSS Standard FINRA Difference between Information Security and Cyber Security Cyber Security Vulnerability Elements of vulnerability management Social Engineering Vulnerability Assessment Vulnerability management Types of cyber security vulnerabilities Identification of security vulnerability Types of social engineering attacks Penetration Testing Penetration Testing Tools Types of penetration testing Process of Penetration Testing What is Phishing Elements of cyber security Difference between Spoofing and Phishing Difference between Network Security and Cyber Security Difference between Ethical Hacking & Cyber Security Role of artificial engineering in cyber security Cyber Forensics Definition Cyber Security job qualifications Cyber Security Prerequisites Cyber Security Identity and Access Management What is Cyber Forensics Different Types of Cybercrime Different types of cybercrime Tunneling Techniques in Cyber Security

Types of Cyber Security

Cyber security is designed to provide security to cyber users, including the integrity of the interconnected system, software, hardware, and data from cyber-attacks.

Everything personal or professional rely on computers and the internet; therefore, hackers can misuse the personal information of user because the internet is continuously used for transportation, health, medicine, shopping, banking, education, communication, and the entertainment industry. Hackers with evil measures can harm computer systems that affect business integrity, finances, etc.

Every working area of a human being is highly dependent on computers. Still, with the internet, cyber-crime also takes birth, so it has become necessary to secure every field of work, including business, employees, and customers. To deal with this situation, cyber security is divided into many parts.

Different types of cyber security are as follows:-

  • Critical infrastructure security

Business owners and organizations must trust the security and resilience of critical infrastructures and ensure their business with its protection. This is vital to our society's safety and well-being.

The critical infrastructure consists of cyber-physical systems, assets, and networks of the system on which the working of modern society relies. This type of cyber security protects the data centers, servers, network communications, and IT centers to limit computer system vulnerabilities from terrorism, corruption, and sabotage.

Critical infrastructure security handle department like:

  1. Electricity Grid, including power supply and transmission
  2. Water Supply/ Purification
  3. Cooling system
  4. Traffic Lights
  5. Shopping Centers
  6. Air circulation
  7. Heating system
  8. Hospitals

Critical infrastructure security works with a plan that helps prevent future damage by dealing with all the system-associated vulnerabilities associated with that infrastructure’s system. If a business doesn't relate to critical infrastructure security, a portion of its operations develops a contingency plan to prevent cyber-attacks.

  • Application security

A system and internet run with the help of applications, so software application protection is mandatory in which program code and data are protected against cyber threats and breaches. Different internal and external threats arise in the development and implementation stage of an application, including the design and deployment phases which need to be tackled instantly by using hardware and software methods.

Application is the medium through which work is carried out and accessible over networks. All the application development stages are protected by implementing Security standards, systems, procedures, and tools. Some of the methods of application security that protect the confidential and sensitive data assets are as follows:- 

  1. Authentication of application
  2. Authorization of system and application
  3. Antispyware Software
  4. Encryption Programs
  5. Application Security Testing
  • Network security

Network security protects the network from outside threats, including unauthorized intrusion of internal networks, by protecting the infrastructure and inhibiting access to the system.

Network security acts as a wall between the network and outsider intruders or malicious activity to an organization using hardware and software technologies. It protects business reputation by implementing policies and procedures to prevent unauthorized access, modification, and network exploitation. Network security teams use machine learning to flag abnormal traffic to meet the demand of employees and customers and alert threats in real-time to help better manage network security monitoring.

The method used in network security for protection:

Extra loginsDouble step protection is applied to login into a system (User ID, password, phone number, and email verification).
New passwordsChange of password at regular intervals of time.
Application securityEvery business uses its own or third-party application that might contain vulnerabilities for its work. Application security applies patches to these vulnerabilities because they can expose and infiltrate the network and prevents any breach.
Antivirus programsWorking or communicating with the help of the internet, different viruses attack the system network security provides antivirus programs protection to save the confidential data.
Antispyware softwareThis software prevents ransomware, malware, and spyware.
Email securityNetwork security provides security to emails as these are the most common gateways for a security breach. Email bombing and phishing are common attacks that need to be prevented.
EncryptionAll personal or professional data should be encrypted.
Data loss preventionNetwork security mainly prevents the loss of data internally or externally
FirewallsFirewalls act as the wall between trusted internal networks and external networks.
Monitored internet accessedNetwork security monitors and records the accessing of the internet in the system.
  • Internet of Things Security

Security experts developed IoT (Internet of Security) security to secure Internet devices and networks. Rather than a computer system, there are other devices too that uses the internet/network with several application that too opens the door to cyber threats and breaches that need to be protected. Internet of Things protects the system, monitors it, identifies all the risks, and fixes the vulnerabilities from devices that can cause security risks for your business. 

IoT devices include various critical and non-critical cyber-physical systems:-

  1. Electronic appliances
  2. Sensor machines
  3. Smart televisions
  4. Wi-Fi routers
  5. Computer systems and printers
  6. Security cameras
  • Cloud security

Cloud is the new destination for storing the database in this techno-savvy world. Cloud is the open and unlimited source of storing databases for the business or organization. Nowadays, every enterprise is moving toward cloud storage. Cyber security has paid special attention to cloud security, due to which cloud is taking it all over.

Cloud security software is designed to monitor and protects data in the cloud resources. Experts constantly help enterprises create and implement new security tools to secure users' data.

Cloud security experts have demolished the myths that traditional approaches are much more suitable and reliable for storing the data on physical servers and own controlled systems. Cloud security is more than the security and accessibility of data; it focuses on the physical location of data. It offers low costs of maintaining huge data facilities in less time and in a secured environment where the risk of security breaches is minimal.   

  • Information security

Information Security is one of the types of security where different tools are designed and deployed to safeguard your critical business information from alteration, destruction, and disruption. It is specifically designed to protect the privacy and integrity of data in transit and storage of data. Therefore the main objective of information security and InfoSec is CIA – Confidentiality, Integrity, and availability of the data. The CIA authorization guarantees the user the system and application security of protecting data.

Some Information Security is:

  • Cryptography – A method through which content is secured by using encryption keys that helps access encrypted data. It’s a vast and crucial method of preventing data integrity, confidentiality, and availability.
  • Vulnerability management – In this method, the whole application and system are scanned to detect weak spots (unpatched software), which can threaten the business in the future. So, this handles all the system vulnerabilities and applies patches to them.
  • Incident response is an essential incident response plan designed to restore and preserve data during or after a malicious attack. Incident response preserves data for possible prosecution and further prevents breaches.
  • End-user education

End-user behavior is the first line of defense against cyber-attacks that address and prevent many security issues. So, end-user education allows security best practices by educating and training users about security and safety measures to restrict malware and other malicious software. An organization provides end-user education training at a language and technical level that every user against any cyber threat can understand.   

Does this training program cover different phishing scams, device security, password creation, physical security, threats, and methods of prevention of attacks, including what to download? What to click? How do we avoid unknown threats?.

  • Security Compliances

Security compliance is not a type of security; these are just policies implemented in the organization to protect the computer system. These are rules made as to the security measures that can be followed by every organization to be protected. These measures made restrictions that bound the users or employees from performing particular activities resulting from security compliance. Most common and popular compliance practiced by large, mid, and some the small organizations are given below that vary industry-wise:

  1. HIPPA
  2. ISO standard
  3. PCI DSS
  4. FINRA
  5. GDP
  • Operational security

Operational security comes under the risk management process for all internal cyber security. It handles the security of the operations performed in the system that include decisions and processes for handling and protecting data assets. It keeps an eye on the permissions given to the user to perform the functions (accessing a network and how and where data should be stored) that fall under this umbrella. This security measure also ensures a backup plan for securing data by educating employees and users to keep personal and business information secure.