Question

In: Computer Science

Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application...

Describe each of the 5 main types of cyber security:

1) Critical infrastructure security:

2) Application security:

3) Network Security:

4) Cloud security:

5) Internet of things security

Solutions

Expert Solution

1. Critical infrastructure security :

Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety. Although the elements of critical infrastructure vary to some extent on the country in question, there are many commonalities among nations. With the ongoing trends to M2M networking and the Internet of Things (IoT), devices in industrial environments are increasingly connected to the internet and capable of exchanging data.

2. Application security :

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. Application security tools that integrate into your application development environment can make this process and workflow simpler and more effective. These tools are also useful if you are doing compliance audits, since they can save time and the expense by catching problems before the auditors seen them.

The rapid growth in the application security segment has been helped by the changing nature of how enterprise apps are being constructed in the last several years. Gone are the days where an IT shop would take months to refine requirements, build and test prototypes, and deliver a finished product to an end-user department. The idea almost seems quaint nowadays.

3. Network Security :

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them. Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users, and programs to perform their permitted critical functions within a secure environment.

4. Cloud Security :

Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding public internet connections. Cloud security is essential for the many users who are concerned about the safety of the data they store in the cloud. They believe their data is safer on their own local servers where they feel they have more control over the data. But data stored in the cloud may be more secure because cloud service providers have superior security measures, and their employees are security experts. On-premise data can be more vulnerable to security breaches, depending on the type of attack. Social engineering and malware can make any data storage system vulnerable, but on-site data may be more vulnerable since its guardians are less experienced in detecting security threats.

5. Internet of Things Security :

Internet of Things security focuses on protecting your internet-enabled devices that connect to each other on wireless networks. IoT security is the safety component tied to the Internet of Things, and it strives to protect IoT devices and networks against cybercrime. IoT technologies pose potential dangers to your internet safety.

That’s why it’s a good idea to protect your digital life by securing your IoT-connected devices. Here are ten ways to do that.

1. Install reputable internet security software on your computers, tablets, and smartphones.

2. Use strong and unique passwords for device accounts, Wi-Fi networks, and connected devices. Don’t use common words or passwords that are easy to guess, such as “password” or “123456.”

3. Be aware when it comes to apps. Always make sure you read the privacy policy of the apps you use to see how they plan on using your information and more.

4. Do your research before you buy. Devices become smart because they collect a lot of personal data. While collecting data isn’t necessarily a bad thing, you should know about what types of data these devices collect, how it’s stored and protected, if it is shared with third parties, and the policies or protections regarding data breaches.

5. Know what data the device or app wants to access on your phone. If it seems unnecessary for the app’s functionality or too risky, deny permission.

6. Use a trusted VPN, which helps to secure the data transmitted on your home or public Wi-Fi.

7. Check the device manufacturer’s website regularly for firmware updates.

8. Use caution when using social sharing features with these apps. Social sharing features can expose information like your location and let people know when you’re not at home. Cybercriminals can use this to track your movements. That could lead to a potential cyberstalking issue or other real-world dangers.

9. Never leave your smartphone unattended if you’re using it in a public space. In crowded spaces, you should also consider turning off Wi-Fi or Bluetooth access if you don’t need them. Some smartphone brands allow automatic sharing with other users in close proximity.


Related Solutions

Cyber security write a small antivirus policy for the IT infrastructure and users in a small...
Cyber security write a small antivirus policy for the IT infrastructure and users in a small business an elementary school You may research anti-virus policies of organizations on the web, please use and cite responsibly.
what could be the Impact of the blockchain on critical infrastructure security ?
what could be the Impact of the blockchain on critical infrastructure security ?
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we...
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we can only deal with application security. Although it is the area we work on, but overall security of even our application depends upon the organizational security policies. Do you agree? Comment using an example. Q5. There are 4 types of security threats namely, Interception, interruption, modification and fabrication. As a software programmer, what threat is the one you may work to avoid and how?...
What is the role of Homeland Security in critical infrastructure protection? give an example.
What is the role of Homeland Security in critical infrastructure protection? give an example.
1. Describe the critical role of international perspectives in the application of accounting. 2. Discuss how...
1. Describe the critical role of international perspectives in the application of accounting. 2. Discuss how differences in culture, the legal system, and the socio-economic environment impact the interpretation and analysis of financial information in different countries. 3. Improve your skills related to global financial information. 4. Discuss the need for the creation of uniform accounting standards of international application. ABC Corp. is involved in various lawsuits regarding product liability, commercial liability, and other matters that arise from time to...
1. Describe the critical role of international perspectives in the application of accounting. 2. Improve your...
1. Describe the critical role of international perspectives in the application of accounting. 2. Improve your skills related to global financial information. 3. Discuss the need for the creation of uniform accounting standards of international application. On June 30, 2018, ABC Co. purchased a machine for $120,000. The estimated useful life of the machine is 8 years and no residual value. An important component of the machine is a specialized hight-speed drill that will need to be replaced in 4...
in a short essay, describe chinas cyber security and the technology used.
in a short essay, describe chinas cyber security and the technology used.
Describe the types of activities in each of the three main sections of the Statement of...
Describe the types of activities in each of the three main sections of the Statement of Cash Flows and provide two examples. a) Operating b) Investing c) Financing
1. What are the three main types of Securities traded on public markets? Briefly describe each....
1. What are the three main types of Securities traded on public markets? Briefly describe each. 2. Briefly explain how CDO tranches work and why they are used. 3. Briefly explain going ‘short’ in market trading.
what is chapter 1, ch 2, ch 3 of Essential Cyber Security book by Josiah Dykstra...
what is chapter 1, ch 2, ch 3 of Essential Cyber Security book by Josiah Dykstra talking about?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT