What is Cyber security?
Cyber security can define as techniques and practices designated to protect data. Now we are talking about digital data that stored, transmitted or used. On an information system, it can be attack or unauthorized access.
When a hacker or attacker coming into your system and trying to get the data they are not going to enter the computer. So the passwords and locks are gives minimum security.
We are protecting data from unauthorized access, unauthorized modifications, unauthorized deletions. We don’t want to people get data just keep it confidential. Unless it unauthorize. Modifying means changing data. So we want integrity the data. Lastly we don’t want deleting any data at us. Want to be available. So these are very complex when we get into implementing security using these principles.
Example of access
Using computer or other devices like mobile devices, phone, a tablet or getting into an actual folder or directory than contain files, getting into those files. Executing cell phone application or running a software application. Every user that does this need to be authorize. Need to control it is opening devices or using devices, opening files authorized.
As well as modification, anybody change computer devices changing the configurations of the computer devices and all. And these must be done with permission. You can identify who and be enter or exit.
Advantages of cyber security
Protection of the business, Increase productivity, Inspire customer ,Stop your website from changing , Protection for your customer or client.
How Cyber security works?
Starts with authentication mechanisms. It is a part when you going to be identify a person, authorize a person for some access and controls. Authentication a person actually claim to be. So, use username or password autogenerated by a server or send to a registered device that the person owns.
The password needs some complicated standard to secure the password. So the password is strong cracking program cannot easily crack it.
All operating systems or all applications will be willing a update could be change performance.But more for security. So the vulnerabilities of application and operating systems are found out the developers of software over a period of time start sending out these updates also called ‘patches’ do the end users. It is very important to the end users to identify these security patches and install them on the devices as soon as possible. The remain open their folders, vulnerabilities and unpatched system. These can be easily hacked.
04. Using antivirus program
To protect your system from viruses ,worms, trojans and malwares needs to be a software that install in your computer. That is going to watched out for you cannot operate the system to itself.
So that has to be a antivirus what will be scan the connection that you are making , use the website that you will be visiting and ensure everything.
05.Install firewall on server
Software and hardwear that allows or dose not allows some functionality.
Various websites that holds hacker make fake mails , bulling you for getting confidential information.
What kind of encryptions are suitable ,What kind of encryption should be or should not be ,How the encryption should function and how the encryption enhance the value of data and what we certain need are the considering points needs to be encryption.
It means domain name of server .Basically the index that needs to your domain name to ip address.Now on the internet computer not automate the names.They take an only ip address and mac address. As an example when we typing google browser doesn’t know what is google .com. It send the packet to DNS server and in the DNS server it search where the google .com is located.
It is given the corresponding ip address because of which the packet goes to the relevant server. They are attack where the DNS can be compromise and pointing to your particular website can be change to point malicious server that hacker was hosting. So must secure the DNS server.
What is Cyber security? Cyber security can define as techniques and practices designated to protect data. Now we are talking about digital data that stored, transmitted or used. On an information system, it can be attack or unauthorized access. When a hacker or attacker coming into your system and trying to get the data they…