Cyber Security Fundamentals, Definition, Benefits, Cyber Space and Cyber-Law

0

Cyber Security Fundamentals, Definition, Benefits, Cyber Space and Cyber-Law


Cyber security is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cyber security measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.

A strong cyber security strategy can provide a good security posture against malicious attacks designed to access, alter, delete, destroy or extort an organizations or user’s systems and sensitive data. 

Cyber security is also instrumental in preventing attacks that aim to disable or disrupt a system’s or device’s operations.

In this article, you will be able to explain the concept of cyber security, describe the benefit of cyber security, explain cyber security countermeasures and explain cyberspace and cyber law.

 

Definition of  Cyber Security?

Cyber security is the protection of internet-connected systems such as hardware, software and data from cyber threats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems. Maintaining cyber security in a constantly evolving threat landscape is a challenge for all organizations.

Traditional reactive approaches, in which resources were put toward protecting systems against the biggest known threats, while lesser known threats were undefended, is no longer a sufficient tactic.

To keep up with changing security risks, a more proactive and adaptive approach is necessary.

Several key cyber security advisory organizations offer guidance.

For example, the National Institute of Standards and Technology (NIST) recommend adopting continuous monitoring and real-time assessments as part of a risk assessment framework to defend against known and unknown threats.

 

Benefits of Cyber security

The benefits of implementing and maintaining cyber security practices include

1.   Business protection against cyber-attacks and data breaches.

2.   Protection for data and networks.

3.   Prevention of unauthorized user access.

4.   Improved recovery time after a breach.

5.   Protection for end users and endpoint devices.

6.   Regulatory Compliance

7.   Business continuity.

8.   Improved confidence in the company’s reputation and trust for developers, partners, customers, stakeholders and employees.

 

Cyber security domains

A strong cyber security strategy has layers of protection to defend against cybercrime, including cyber-attacks that attempt to access, change, or destroy data; extort money from users or the organization; or aim to disrupt normal business operations. Countermeasures should address

1. Critical infrastructure security

Practices for protecting the computer systems, networks, and other assets that society relies upon for national security, economic health, and/or public safety. The National Institute of Standards and Technology (NIST) have created a cyber-security framework to help organizations in this area, while the U.S. Department of Homeland Security (DHS) provides additional guidance.

2. Network security

Practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware

3. Application security

Processes that help protect applications operating on-premises and in the cloud. Security should be built into applications at the design stage, with considerations for how data is handled, user authentication, etc.

4. Cloud security

Specifically, true confidential computing that encrypts cloud data at rest (in storage), in motion (as it travels to, from and within the cloud) and in use (during processing) to support customer privacy, business requirements and regulatory compliance standards.

5. Information security

Protects the integrity and privacy of data, both in storage and in transit.

 

Operational security

Includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the procedures that determine how and where data may be stored or shared all fall under this umbrella.

 

End-user education

Addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.

End-user education also helps in building security awareness across the organization to strengthen endpoint security. For example, users can be trained to delete suspicious email attachments, avoid using unknown USB devices, etc.

 

Disaster recovery / business continuity planning

Defines how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.

 

Storage security

This includes encryption and immutable and isolated data copies. These remain in the same pool so they can quickly be restored to support recovery, minimizing the impact of a cyber-attack.

 

Cyberspace

Cyberspace refers to the virtual computer world, and more specifically, an electronic medium that is used to facilitate online communication.

Cyberspace typically involves a large computer network made up of many worldwide computer sub networks that employ TCP/IP protocol to aid in communication and data exchange activities. Cyberspace’s core feature is an interactive and virtual environment for a broad range of participants.

 

Cyber Laws

Cyber laws encompass all the legal issues related to the communicative, distributive and transactional aspects of network-related information devices and technologies. It is different from the Property Law or any other law. Unlike property law, it is not so distinct; it is broader since it covers several areas of laws and regulations. It encapsulates the statutory, legal and constitutional provisions related to computers and the internet.

Cyber laws are related to individuals and institutions that:

• Plays a crucial role in providing cyberspace access to people

• Generates software and/or hardware to allow people with entry into cyberspace.

• Make use of their computer system to gain entry into cyberspace.

 

Cyber Laws and Cyber Security

In order to ensure that humans do not misuse cyber technologies, cyber laws are generated. The overall idea of the cyber law is to stop any person from violating the right of other persons in cyberspace. Any kind of violation of cyber rights is considered to be a cyberspace violation and is deemed punishable under cyber laws. It is important to note that since cyberspace does not belong to the physical world, the physical laws do not apply to cyberspace crime.

A separate set of cyber laws are formulated by the government to provide cyber security to cyber users. Such cyber laws are needed to monitor and prevent any immoral or illegal activities of humans. Some of the common cyberspace violation activities include hacking, theft, money laundering, terrorism, piracy, etc.

Hackers can get hold of any internet account through the Domain Name Server (DNS), phishing, IP address, etc. to get entry into the computer system of any person and steal the data, or introduce computer bugs and render the system ineffective.

 

Conclusion on Cyber Security Fundamentals, Benefits, Cyber Space and Cyber-Law

Organizations are finding themselves under the pressure of being forced to react quickly to the dynamically increasing number of cyber security threats, Cyber security is also one of the most important aspects of the fast-paced growing digital world.

The threats of it are hard to deny, so it is crucial to learn how to defend critical organization infrastructure.

In this article, we have been able to define Cyber security, identify the benefits of cyber security, explain the concept of cyber security and explain cyber security counter measures

 

Frequent asked question


Define cyber security and what are the benefits of cyber security?

Answer

Cyber security is the protection of internet-connected systems such as hardware, software and data from cyber threats. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems

 

Benefits of cyber security

The benefits of implementing and maintaining cyber security practices include:

• Business protection against cyber-attacks and data breaches.

• Protection for data and networks.

• Prevention of unauthorized user access.

• Improved recovery time after a breach.

• Protection for end users and endpoint devices.

• Regulatory Compliance

• Business continuity

Leave a Reply

Your email address will not be published. Required fields are marked *