ch1 Introduction
ch1 Introduction
Abstract –In the current world that is run by technology and network connections, it is
crucial to know what cyber security is and to be able to use it effectively. Systems, important
files, data, and other important virtual things are at risk if there is no security to protect it.
Whether it is an IT firm not, every company has to be protected equally. With the
development of the fresh technology in cyber security, the attackers similarly do not collapse
behind. They are consuming better and enhanced hacking techniques and aim the weak points
of many businesses out there. Cyber security is essential because military, government,
financial, medical and corporate organizations accumulate, practice, and stock unprecedented
quantities of data on PCs and other devices. An important quota of that data can be sensitive
information, whether that be financial data, intellectual property, personal information, or
other various kinds of data for which illegal access or acquaintance could ensure negative
concerns.
Key words:
Cyber security, cyber crime , cyber ethics , social media , cloud computing , android apps.
In today's digital age, where technology and the internet play an integral role in our personal
and professional lives, the need for adequate security measures to protect our digital assets is
of utmost importance. Cybersecurity refers to the practice of protecting computer systems,
networks, and data from unauthorised access, cyber threats, and attacks.
Cybersecurity involves a range of techniques and practices aimed at safeguarding information
technology systems and networks from potential threats and breaches. These threats can come
in various forms, including malware, hacking attempts, phishing attacks, ransomware, and
more.
The consequences of cyber attacks can be severe, ranging from financial loss, reputation
damage, regulatory penalties, to even compromising national security.
The primary goal of cybersecurity is to ensure the confidentiality, integrity, and availability
of information and resources. Confidentiality refers to protecting sensitive data from
unauthorised access and disclosure. Integrity ensures that data remains accurate, reliable, and
unmodified. Availability ensures that systems and resources are accessible and usable when
needed.
There are various key elements of cybersecurity that work together to create a robust defence
against cyber threats:
2.Network Security: Protecting the network infrastructure from unauthorised access, data
breaches, and other malicious activities is essential. This includes implementing firewalls,
intrusion detection systems, access control, and encryption techniques to secure the network.
3.Application Security: Ensuring the security of software applications is crucial as they often
serve as entry points for hackers. Implementing secure coding practices, conducting regular
vulnerability assessments, and applying patches and updates are critical for application
security.
5.Incident Response: Establishing incident response plans and procedures to address cyber
threats promptly is crucial. This includes identifying, containing, eradicating, and recovering
from security incidents to minimise damage and downtime.
6.Security Awareness and Training: Educating and training employees, users, and
stakeholders about safe computing practices and potential threats helps in fostering a
security-conscious culture. This includes creating awareness about phishing scams, social
engineering attacks, and the importance of strong passwords.
REFERENCES :
A Sophist Article 04.12v1.dNA, eight trends changing network security by James
Lyne.