What Is Cyber Security?
What Is Cyber Security?
"Cyber Security is the set of principles and practices designed to protect our
computing resources and online information against threats."
Network Security:
Sometimes we used to utilize free Wi-Fi in public areas such as cafes, Malls,
etc. With this activity, 3rd Party starts tracking your Phone over the internet.
If you are using any payment gateway, then your bank account can be
Empty. So, avoid using Free Network because free network doesn’t support
Securities.
Application Security:
It involves protecting the software and devices from unwanted threats. This
protection can be done by constantly updating the apps to ensure they are
secure from attacks. Successful security begins in the design stage, writing
source code, validation, threat modeling, etc., before a program or device is
deployed.
Most of the Apps that we use on our Cell-phone are Secured and work
under the rules and regulations of the Google Play Store.
Many of the apps pretend to be safe, but after taking all information
from us, the app share the user information with the 3rd-party.
The app must be installed from a trust-worthy platform, not from
some 3rd party website in the form of APK (Android Application
Package).
Mobile Security:
These goals form the confidentiality, integrity, availability (CIA) triad, the
basis of all security programs. The CIA triad is a security model that is
designed to guide policies for information security within the premises of
an organization or company. This model is also referred to as the AIC
(Availability, Integrity, and Confidentiality) triad to avoid the confusion
with the Central Intelligence Agency. The elements of the triad are
considered the three most crucial components of security.
Confidentiality is defined as the process of protecting sensitive information
from unauthorized access by converting it into an unreadable form. This
process ensures that only authorized persons can decrypt and read the
information. Confidentiality plays a significant role in securing
communication networks and systems, protecting sensitive data such as
passwords, social security numbers, financial records, and trade secrets
from unauthorized access and disclosure.
For example if we say I have a password for my Gmail account but someone
saw while I was doing a login into Gmail account. In that case my password
has been compromised and Confidentiality has been breached.
Encryption
Authentication
Access control
Once a user has been authenticated, the next step is to ensure that they can
access the appropriate information resources. This is done through the use
of access control. Access control determines which users are authorized to
read, modify, add, and/or delete information. Several different access
control models exist. Here we will discuss two: the access control list (ACL)
and role-based access control (RBAC). For each information resource that
an organization wishes to manage, a list of users who have the ability to
take specific actions can be created. This is an access control list or ACL. For
each user, specific capabilities are assigned, such as reading, writing,
deleting, or adding. Only users with those capabilities are allowed to
perform those functions. If a user is not on the list, they have no ability even
to know that the information resource exists.
Access control defines rules and policies for limiting access to a system or
to physical or virtual resources. It is a process by which users are granted
access and certain privileges to systems, resources or information. In access
control systems, users need to present credentials before they can be
granted access such as a person's name or a computer's serial number. In
physical systems, these credentials may come in many forms, but
credentials that can't be transferred provide the most security.
Authorization
Physical Security
Backups
Checksums
It is a method for storing data in such a way that small changes can be
easily detected and automatically corrected.