Siz_Education||How we protect ourselves Online||20% payout siz-official

in Steem Infinity Zone3 years ago

Greetings

How are you all my dear community member's.I wish all of you are happy 😊 and enjoying your life. Today I will tell you how we secure 🔐 our system online from any type unauthorized person.yes I'm talking about cyber security.so let's Start my lesson.

IMG_20211206_135308.png

What is Online Security ?


The online security is also called cyber security.
The way to protect online systems such as computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as cybersecurity. We can divide cybersecurity into two parts, one cyber, and the other security. Cyber refers to technologies that integrate systems, networks, systems, and data. And security is about the security of programs, networks, applications, and information. In some reason, it is also called electronic information security or information technology security.
Cyber Security is a body of technologies, processes, and processes designed to protect networks, devices, systems, and data from attack, theft, damage, repair or unauthorized access. "

Types of Cyber Security


The assets of each organization are a combination of different systems. These systems have a strong cybersecurity structure that requires concerted efforts across all of their systems. Therefore, we can classify cybersecurity into the following domains:

Network Security:

ensuring_network_security_e34d6ce4bb.png
Source
Includes the use of hardware and software to protect the computer network from unauthorized access, attacks, attacks, interruptions, and malicious use. This protection helps the organization to protect its assets from external and internal threats.

Application Security:


Includes protection of software and devices from unwanted threats. This protection can be done by regularly updating the applications to ensure that 9they are protected from attack. Effective security starts at the design stage, coding code, validation, threat model, etc., before using the system or device.

Data or Data Security:

Involves using a secure data storage system to maintain the integrity and confidentiality of data, both in storage and on the go.

Ownership Management:

It deals with the process of determining the level of access that an individual has within the organization.
Operational Security: Includes processing and decision-making in the management and protection of data assets.

Mobile Security:

Includes the protection of organizational and personal data stored on mobile devices, computers, tablets, and other similar devices against various malicious threats. These threats are provided unauthorized access, device loss or theft, malware, etc.

Cloud Security:

Involves the protection of information stored in a digital environment or organization's cloud structures. It uses various cloud service providers such as AWS, Azure, Google, etc., to ensure security from multiple threats.
Disaster Recovery and Business Continuity Planning: It deals with procedures, monitoring, warnings, and plans for how an organization reacts when any hazardous activity causes loss of functions or data. Its policies mandate the resumption of lost operations after any disaster has occurred at the same operating capacity and prior to the event.

User Education:

Responsible for procedures, monitoring, alerts, and systems of how an organization responds when any hazardous activity causes loss of performance or data. Its policies mandate the resumption of lost operations after any disaster has occurred at the same operating capacity and prior to the event.

Why is Cyber Security so important?

  • Now a days we are living in a digital age where all aspects of our lives depend on network, computer and other electronic devices, and software applications.
  • All important infrastructure such as banking system, health care, financial institutions, governments, and manufacturing industries use online devices as a key component of their operations.
  • Some of their information, such as inventory, financial data, and personal data, may be sensitive to unauthorized access or disclosure that could have adverse effects.
  • This information gives participants and intimidating actors access to them for financial gain, fraud, political or social motives, or material destruction.
  • Cyber-attack is now a global problem that breaks the system, and further security attacks could threaten the global economy. Therefore, it is important to have a good cybersecurity strategy to protect sensitive information from high-level security breaches. In addition, as the volume of cyber security increases, companies and organizations, especially those dealing with national security, health, or financial records, need to take strict online security measures and the method to protect their sensitive business and personal information.
Sort:  
 3 years ago 

Good post dear friend keep it up dear friend and keep learn with our steem fellows and friends and newcomers.

Regards, Faran Nabeel

Thanks u so much sir for your appreciation ☺️😊