Spread the word.

Share the link on social media.

Share
  • Facebook

Sign Up Sign Up

2+11= ( 13 )

Have an account? Sign In Now

Sign In Sign In

2+11= ( 13 )

Forgot Password?

Don't have account, Sign Up Here

Forgot Password Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

2+11= ( 13 )

Have an account? Sign In Now

You must login to ask question.

2+11= ( 13 )

Forgot Password?

Need An Account, Sign Up Here
Let's Discuss Online Logo Let's Discuss Online Logo
Sign InSign Up

Let's Discuss Online

Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • About Us
  • Blog
  • Contact Us
Home / Questions /Q 1403
Next
Answered
Asked: August 26, 20222022-08-26T08:43:17-04:00 2022-08-26T08:43:17-04:00In: Technology

What is cyber security

Anonymous
Anonymous

What is Cyber Security, What are functions, process and how its implemented?

cyber crimecyber security
  • 0
  • 1 1 Answer
  • 224 Views
  • 0 Followers
  • 0
  • Share
    Share
    • Share on Facebook
    • Share on Twitter
    • Share on LinkedIn
    • Share on WhatsApp

1 Answer

  • Voted
  • Oldest
  • Recent
  1. AdminMedicine

    AdminMedicine

    • 17 Questions
    • 16 Answers
    • 3 Best Answers
    • 48 Points
    View Profile
    Best Answer
    AdminMedicine
    2022-08-26T08:52:31-04:00Added an answer on August 26, 2022 at 8:52 am

    Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
    Cybersecurity and cyber threats have been consistently present for the last 50 years of technological change. In the 1970s and 1980s, computer security was mainly limited to academia until the conception of the Internet, where, with increased connectivity, computer viruses and network intrusions began to take off. After the spread of viruses in the 1990s, the 2000s marked the institutionalization

    As per IBM,
    A strong cybersecurity strategy has layers of protection to defend against cyber crime, including cyber attacks that attempt to access, change, or destroy data; extort money from users or the organization; or aim to disrupt normal business operations. Countermeasures should address:

    Critical infrastructure security – Practices for protecting the computer systems, networks, and other assets that society relies upon for national security, economic health, and/or public safety. The National Institute of Standards and Technology (NIST) has created a cybersecurity framework to help organizations in this area, while the U.S. Department of Homeland Security (DHS) provides additional guidance.

    Network security – Security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.

    Application security – Processes that help protect applications operating on-premises and in the cloud. Security should be built into applications at the design stage, with considerations for how data is handled, user authentication, etc.

    Cloud security – Specifically, true confidential computing that encrypts cloud data at rest (in storage), in motion (as it travels to, from and within the cloud) and in use (during processing) to support customer privacy, business requirements and regulatory compliance standards.

    Information security – Data protection measures, such as the General Data Protection Regulation or GDPR, that secure your most sensitive data from unauthorized access, exposure, or theft.

    End-user education – Building security awareness across the organization to strengthen endpoint security. For example, users can be trained to delete suspicious email attachments, avoid using unknown USB devices, etc.

    Disaster recovery/business continuity planning – Tools and procedures for responding to unplanned events, such as natural disasters, power outages, or cybersecurity incidents, with minimal disruption to key operations.

    Storage security – IBM FlashSystem® delivers rock solid data resilience with numerous safeguards. This includes encryption and immutable and isolated data copies. These remain in the same pool so they can quickly be restored to support recovery, minimizing the impact of a cyber attack.

    Mobile security – IBM Security® MaaS360 with Watson enables you to manage and secure your mobile workforce with app security, container app security and secure mobile mail.

    cybersecurity myths As per IBM,
    The volume of cybersecurity incidents is on the rise across the globe, but misconceptions continue to persist, including the notion that:

    Cybercriminals are outsiders. In reality, cybersecurity breaches are often the result of malicious insiders, working for themselves or in concert with outside hackers. These insiders can be a part of well-organized groups, backed by nation-states.
    Risks are well-known. In fact, the risk surface is still expanding, with thousands of new vulnerabilities being reported in old and new applications and devices. And opportunities for human error – specifically by negligent employees or contractors who unintentionally cause a data breach – keep increasing.
    Attack vectors are contained. Cybercriminals are finding new attack vectors all the time – including Linux systems, operational technology (OT), Internet of Things (IoT) devices, and cloud environments.
    My industry is safe. Every industry has its share of cybersecurity risks, with cyber adversaries exploiting the necessities of communication networks within almost every government and private-sector organization. For example, ransomware attacks (see below) are targeting more sectors than ever, including local governments and non-profits, and threats on supply chains, “.gov” websites, and critical infrastructure have also increased.

    Source : IBM and Wikipedia

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
Leave an answer

Leave an answer
Cancel reply

Browse

Sidebar

Related Questions

    • On: May 23, 2023
    • Answers: 0

    Fix wordpress sitemap error: error on line 2 at column

    If you are here you have probably seen an error similar to "error on line 2 at column 6: XML declaration allowed only at the start of the document ". This typically happens when a plugin or theme function incorrectly

    • On: April 20, 2023
    • Answers: 0

    How To Fix LCP Issue: Longer Than 4s (Desktop) or

    LCP issue: longer than 2.5s (mobile) URLs with this issue need to improve the page experience that they provide PLEASE HELP ME TO SOLVE THIS ISSUE

  • What is Dynatrace
    • On: April 20, 2023
    • Answer: 1

    What is Dynatrace

    What is Dynatrace? What is the Purpose of the dynatrace tool and how it is used?  

    • On: April 14, 2023
    • Answers: 0

    does SEO help your business ?

    SEO is crucial because it makes your website more visible, and that means more traffic and more opportunities to convert prospects into customers.

    • On: November 15, 2022
    • Answers: 0

    What exactly is an LED Tri-proof light?

    Products with the moniker "LED Tri Proof Light" are corrosion, dust, and water resistant. And the anti-oxidation, anti-corrosion materials, as well as the silicon seals, will achieve this. High durability since the connector clip's double insulation ensures the circuit's safety.

Stats

  • Questions : 109
  • Answers : 26
  • Posts : 0
  • Comments : 0
  • Best Answers : 4
  • Users : 190

Advertising

Questions Categories

Finance
18Questions
, 0Followers
Business
14Questions
, 0Followers
Social Media
13Questions
, 0Followers
Education
8Questions
, 0Followers
Technology
13Questions
, 0Followers
Health
6Questions
, 0Followers
Cars
6Questions
, 0Followers
Wordpress
5Questions
, 0Followers
Auto
10Questions
, 0Followers
Electronics
4Questions
, 0Followers
Properties
3Questions
, 0Followers
Family
3Questions
, 0Followers
Games
2Questions
, 0Followers
Publications
2Questions
, 0Followers
Jobs
2Questions
, 0Followers
Tours and Travels
2Questions
, 0Followers
Law
1Question
, 0Followers
Fashion
1Question
, 0Followers
OpenCart
0Questions
, 0Followers
Magento
0Questions
, 0Followers
C#
0Questions
, 0Followers
CSS
0Questions
, 0Followers
Beauty and Personal care
0Questions
, 0Followers
Books
0Questions
, 0Followers
Sports
0Questions
, 0Followers
Bikes and Motor Cycle
0Questions
, 0Followers
Fitness
0Questions
, 0Followers
Foods
0Questions
, 0Followers
Agriculture and gardening
0Questions
, 0Followers

Explore

  • Home
  • Communities
  • Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help

Footer

© 2022 LetsVDiscuss. All Rights Reserved
With Love by Lets V Discuss.

Skip to toolbar
  • About WordPress
    • WordPress.org
    • Documentation
    • Support
    • Feedback
  • Log In
  • Register