How does Cyber Security work
What Cyber Security is and how it works. We're also going to give you a few tips on how you can keep your online security safe. So whether you're just starting out or you're looking for an extra layer of protection, this video is for you!
What are some of the cyber security sub-domains?
Application Security
Application security involves implementing various defenses within all software and services used within an organization against a wide range of threats.
Identity Management and Data Security
Identity management includes frameworks, processes, and activities that enable authentication and authorization of legitimate individuals to information systems within an organization.
Network Security
Network security involves implementing both hardware and software mechanisms to protect the network and infrastructure from unauthorized access, disruptions, and misuse.
Mobile Security
Mobile security refers to protecting both organizational and personal information stored on mobile devices like cell phones, laptops, tablets, etc. from various threats such as unauthorized access, device loss or theft, malware, etc.
Cloud Security
Cloud security relates to designing secure cloud architectures and applications for organizations using various cloud service providers such as AWS, Google, Azure, Rackspace, etc. Effective architecture and environment configuration ensure protection against various threats.
What’s the difference between a cyber-attack and a security breach?
A cyber-attack is not exactly the same as a security breach. A cyber-attack as discussed above is an attempt to compromise the security of a system.
Attackers consistently try a multitude of cyber-attacks against their targets with a determination that one of them would result in a security breach.
5 top cyber security best practices to prevent a breach
1. Conduct cyber security training and awareness
2. Perform risk assessments
3. Ensure vulnerability management and software patch management/updates
4. Use the principle of least privilege
5. Enforce secure password storage and policies
I hope you guys like and enjoy our video, make sure to subscribe to our YouTube channel and hit the bell icon for upcoming videos. Thanks for watching.
#computerhackers #cybersecurity #networksecurity
Ещё видео!