Why do We need cyber security?

Why do We need cyber security?

image represents cyber security
  • Why Is Cyber-security Important to Me?

Let me tell you all aspects of Cyber security and why it’s so important nowadays.
I will offer you overview all aspects so it’ll be easy for you to know .

  • What is Cyber-security?

According to the Wikipedia Cyber-security, computer security or IT security is the protection of Computer security from theft of or damage to their Hardware, Software or Electric data, as well as from disruption or misdirection of the services they provide over time.
In my terms Cyber-security or the information technology security are the techniques of protection computer systems, complex networking devices, programmable devices and most important Data from unauthorized access or attacks that are aimed for exploitation.

  • What are the areas which are covered in Cyber security?

  1. Application security
  2. Information security
  3. Disaster recovery
  4. Network security

  • How I am at risk?

In simple words, unauthorized users that invade a system are called hackers and hackers have a wide variety of tools to harm a computer machine. Hackers usually gain access to computer system by using malicious logic peace of code (virus) somewhere on the net waiting for the target to encounter or to open the virus file/code. The common ways which a computer can be infected/hacked are:

Open an email attachment that containing a malicious logic code. Moseley these mails are located in the spam folder but some of hackers make their code fully undetected so it cannot be removed by antivirus or firewall etc.

By visiting a malicious website. Hackers are specific for their target/users before creating a malicious content they study fully about the Target(what he likes, what are the mostly visiting websites etc.). Commonly these malicious codes are in the form of ads or kind of links once we click we get infected.

Clicking a dangers link. As I explained above.

Inadvertently downloading a malicious software, these software are mostly located in third party sites. Remember always download the software from official website.

  • What kind of damage a hacker can do?

Infected computer may be affected & damaged in many ways. Some times without a user even noticing. Some of hackers are playing it for fun, while others may be attempting to steal the personal information such as credit card numbers, social security numbers and other personal information. Even worst hackers can take control of your infected computer & use it to launch an attack on a large system. It can be used to infect the other computers & sometimes even full network without your knowledge. This practice is so prevalent that access to vulnerable or infected computers is bought and sold among hackers.

  • How Can I Protect Myself ?

As you know most hackers use malicious logic to exploit vulnerabilities in software and gain unauthorized access to computer systems. For this reason only, it is vitally important to install and update your anti-virus, Anti-spyware and firewall software. Because new vulnerabilities in computer systems are found every single day, vendor companies “patch” these vulnerabilities by issuing a series of system updates. To ensure that your computer is safe from known vulnerabilities and possible threats, make sure to install all the updates on a regular basis. Some other basic security measures includes:

Creating a strong password that has at least nine characters or more, contains a capital letter, uses a special character (such as #,!,%,*) and includes a number also.

Consistently track your credit information so that if your computer is infected by chance, you can minimize damage.

Back up important information on your computer and Scan your computer for viruses, spyware and other vulnerabilities on a daily basis.

Only visit websites which you trust, and open emails only from the known contacts.

  • What experts say?

As indicated by the 2018 Cyber danger Defense Report presents the consequences of the broad 2018 CyberEdge® Defense Survey, taking a gander at the global danger scene through the eyes and encounters of IT security experts around the globe. You’ll realize which dangers stress them the most and how this worldwide gathering is protecting against them in the cloud and wherever else.
The survey found that 9 out of 10 organizations are battling cloud security – so, if you’re nervous about your cloud strategy, you’re not alone.

Download the fifth yearly Cyber danger Defense Report and get an entering view into how 1,200 IT security leaders and specialists – speaking to 17 nations and 19 ventures – see and organize their reactions to present day dangers.
The report found organizations were struggling to: Maintain data privacy and confidentiality in the cloud. Control access to the cloud. Monitor cloud environments for threats.

Read the 2018 Cyber threat Defense Report today to seek out out how your private cloud, public cloud, and SaaS security posture and strategy pile up . 2018 Cyber-threat Defense Report. Private cloud, public cloud, and SaaS security posture and strategy pile up . 2018 Cyber-threat Defense Report.PDF

 

Share this content:

Annan Malla

Hello, I'm Annan Malla, an experienced system engineer with a strong skillset in system administration, cloud computing, network administration, computer hardware, and Windows server. I hold a Masters Degree in Business Administration with a focus on Information Technology from LPU Punjab University