First of all, what is cyber security?
cyber security; Protecting mobile devices, servers, computers, electronic systems, networks and data from malicious attacks. The primary goal of cyber security is to protect all corporate assets from both internal and external threats.
Cyber security consists of the following sub-fields:
– Network security is the practice of protecting a computer network from attackers by targeted malicious or opportunistic malware. Effective network security helps protect enterprise assets from multiple external and internal threats.
-Application security mainly focuses on protecting software and devices from threats. Malicious software can gain access to data it is designed to protect. Designing a secure application architecture, writing secure code, performing robust data entry testing, threat modeling, etc. to minimize the possibility of unauthorized access or modification of application resources. includes. Successful security begins in the design phase before an application or device is deployed.
- Information security protects the integrity and confidentiality of data both during storage and transmission.
– Mobile security, mobile phones, laptops, tablets, etc. unauthorized access, device loss or theft of both corporate and personal data stored on mobile devices, malware, etc. means protection from various dangers
– Disaster recovery and business continuity determine how an organization will respond to a cybersecurity incident or other event that causes operational or data loss. It deals with processes, monitoring, alerts, and plans that help organizations prepare to bring business-critical systems online, as well as recover lost processes and systems after an incident.
– User education is essential to formally educate individuals on computer security issues, raise awareness of industry best practices, organizational procedures and policies, and monitor and report malicious activity. This is important for the security of any organization.
TYPES OF CYBER THREATS;
1- Cybercrime involves single actors or groups targeting systems for business disruption or financial gain.
2- Cyber attack usually involves gathering information for political reasons.
3- Cyber terrorism is designed to disrupt electronic systems in a way that causes panic or fear.
4- Malware is software created by a cybercriminal or hacker to corrupt or damage a legitimate user's computer.
There are several types of malware;
– Viruses are malicious software that can replicate themselves. It is a program that attaches itself to a clean file and spreads to a computer system, infecting files using malicious code.
- Worms, viruses-like worms, differ in that they propagate by themselves instead of attaching to a program and infecting other files. Worms often spread across a computer network and exploit vulnerabilities to move from machine to machine.
– Spyware monitors the use of your computer and transmits the information it receives to another entity.
– Trojan horses, This is a type of malware disguised as legitimate software. Cybercriminals trick users into installing Trojans on their computers, thereby damaging their computers or collecting data.
– Ransomware Ransomware, which represents a malicious program, encrypts the content on your computer and prevents the user from accessing their files. Ransomware attackers use untraceable money transfers, often Bitcoin, to reopen files.
– Adware (Adware-supported computer software) represents malicious software based on generating revenue for its developer by distributing advertisements. Although there are a lot of adware on the web and on mobile, Adware floods users with ads, so to speak. Some types of adware can place ads on your desktop - they're harder to turn off.