Cyber-Security Basic understanding

Computer Security, Network Security, Information Security, Web-Security etc. are the protection system from theft or damages or intrusions in your Software and database. Basically, Cyber-security is the protection system which is combined with all above security also protection of your data including hardware software. Cyber-security is immense idea, include physical security, attack prevention, and other vulnerability.

Cyber-Security comprises technologies, process, controls and training that are designed to protect data, network and systems form cyber-attack. This protects organization and individuals from the unauthorized exploitation of network, system and technologies.

So many hackers are attempting to access your computer, attempt to expose, disable, destroy steal or gain your valuable data and asset. Cyber-attack is deliberate exploitation of your system and Data. Cyber-attacks can disrupt and cause considerable financial and reputational damage to even the resilient organization. Ensuring cyber-security requires and coordination of effort throughout and information system, which include:

  • Network Security
  • End-point Security
  • Information Security
  • Email Security
  • Application Security
  • Physical Security
  • Operational Security
  • Disaster Recovery and continuity plan

To deal with the current environment, advisory organizations are promoting a more proactive and adaptive approach. The National Institute of Standards and Technology NIST for example, recently issued updated guidelines in its risk assessment framework that recommend a shift toward continuous monitoring and real-time assessments

The root cause of this intense cyber risk relates to the complexity of legacy system that was never originally configured to stop cyber-attacks. Complex legacy technology and high attack consequences lead to a high cyber security risk for most IT Environment. It could be any reason for such incidents to happen, that could be:

  • Wrong security perimeter is defined
  • Firewall is not incorporated in the network architecture
  • Segmentation of network
  • Lack of redundancy
  • Insecure remote access connection
  • Lack of compatibility of security architectural
  • Components with legacy protocols and system
  • Updates of End point Security
  • Lack of Intrusion detection and prevention system
  • Lack of Proper end user training and awareness

The most effective strategy to mitigate and minimize the effects of a cyber-attack is to build a solid foundation, Latest threat protection system, attack prevention system, upon which to grow your cyber security technology stack. Solution providers often tell their clients their applications are five 9 compatible and will operate seamlessly with the current IT infrastructure, and for the most part, this is not true. The problem arises when we start adding IT security solutions from different manufacturers regardless of the granularity of their configuration settings – technology gaps will always be present. Technology gaps will always appear for one simple reason: developers will always keep certain portions of their code proprietary as part of their competitive advantage. Hence, true compatibility and interoperability may only be 90%. These are known as technology gaps. It is through these gaps that attacks usually occur.

A solid cyber security foundation will identify these gaps and propose the appropriate action to take to mitigate the risk of an attack. A solid foundation provides organisations the confidence to build their cyber security strategies

***In Next Blog we discuss more about Cyber Security***


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.