What is cyber security? Five Types of Cyber security with examples

What is cyber security?


Cybersecurity involves practices installed to ensure the security of networks, applications, sensitive information, and individuals against cyber threats. Cyber-attacks are bad intentions from people or organizations to unauthorized access computer systems, networks, and devices to steal data, disrupt services, or carry out worse attacks. Typical forms of cyber-attacks include but are not limited to phishing, malware, such as ransom ware, social engineering tactics, denial-of-service, known as DOS and distributed denial-of-service known as DDOS attacks. There are various types of cyber Secuities. The topmost types of cyber securities with examples are written below

 Types of cyber security and examples

There are various types of cyber Secuities. The topmost types of cyber securities with examples are written below.


1. Network Security

 cyber network security


Network security is a set of rules and configurations applied to ensure computer networks are safe from unauthorized access, misuse, modification, or destruction.
It plays a vital role in cyber security: it has to guarantee the confidentiality of data and resources, maintain their integrity, and ensure that it is accessible within the network. Network security involves several technologies, policies, and processes that collaborate in providing a safer environment for data transmission and communication. Such protections have been implemented in order to counter cyber threats such as hacking, data breaches, malware attacks, and denial-of-service attacks.

  • Example         
    Virtual Private Networks allow for creating encrypted internet connections that protect data in transit.
  • Intrusion Detection Systems monitor network traffic for potential security threats
  • . SSL certificates ensure that communications between web browsers and servers are secure.

2. Information security

 cyber information security

InfoSec, or information security in short, is the defense of data against unauthorized access. Information risk management deals with the process of minimizing or reducing the probability of unauthorized access. In the event of a security incident, professionals in information security try to minimize its negative effects. If there is a security incident, then the professionals in information security try to reduce its harmful effects.
Example
1. Data loss prevention: These are strategies and technologies deployed to prevent unauthorized access to and dissemination of confidential information. 

2. Access controls: This is the set of policies that define who shall have access to a given data and under what circumstances. 

3. Regular audits: These are reviews and examinations carried out on information systems to ensure that they comply with security policies.


3. National security

 cyber national security

Conventionally, by the term national security, one typically refers to national defense (or national defense in American English), which is to do with the safeguard and protection of an independent state and its institutions, economy, and people.
While hitherto focused on protection against military threats, national security now broadly encompasses the non-military dimension: preventing terrorism, crime, and other violations of law; protection of economic stability, energy security, the environment, food security, and cybersecurity. Apart from the actions of other nations, the national security issues also involve natural disasters, organized crimes, drug trafficking organizations, violent non-state actors, and multinational corporations

. Examples
1. The technologies and strategies used to guard a nation against external threats are called military       defense systems.  
2. The agencies that collect and analyze information to neutralize the threats to national security are termed intelligence agencies.
3. Border security strategies, policies, and tools that are designed to monitor and control national borders.


4. Physical security

Physical security involves the protection of people, hardware, software, networks, and information from physical events and actions that could significantly destroy or damage an organization, business, or agency. This will take account of protection against terrorism, theft, vandalism, burglary, flooding, and natural disasters. Many of these events may be insured against, but the goal of physical security in preventing loss minimizes the time, money, and resources lost due to the event occurring.
Examples
1. The access control systems allow only a few people to get into the facility by utilizing keycards, biometric readers, or security personnel.
2. CCTV Cameras: They help in carrying out surveillance. These cameras record the scenes and actions that help discourage illegal activities.
3. Security Fencing: They act as barriers to keep people out of a particular area.


5. Home security

The two main technologies in the sphere of home security are electronic surveillance and alarm technologies, which help in the detection of an intruder or a break-in and prevent crime at a house or residential property. They are based upon the principle that sensors and cameras at every corner and area of the house are connected to a central control unit. This sensor leads to the activation of the alarm in case of the detection of an intruder, which alarms the emergency services or security personnel.
Example
1.Smart appliances and alarms help in keeping houses safe from burglars.

One thought on “What is cyber security? Five Types of Cyber security with examples

Leave a Reply

Your email address will not be published. Required fields are marked *