In: Computer Science
Describe each of the 5 main types of cyber security:
1) Critical infrastructure security:
2) Application security:
3) Network Security:
4) Cloud security:
5) Internet of things security
1. Critical infrastructure security :
Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety. Although the elements of critical infrastructure vary to some extent on the country in question, there are many commonalities among nations. With the ongoing trends to M2M networking and the Internet of Things (IoT), devices in industrial environments are increasingly connected to the internet and capable of exchanging data.
2. Application security :
Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. Application security tools that integrate into your application development environment can make this process and workflow simpler and more effective. These tools are also useful if you are doing compliance audits, since they can save time and the expense by catching problems before the auditors seen them.
The rapid growth in the application security segment has been helped by the changing nature of how enterprise apps are being constructed in the last several years. Gone are the days where an IT shop would take months to refine requirements, build and test prototypes, and deliver a finished product to an end-user department. The idea almost seems quaint nowadays.
3. Network Security :
Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them. Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users, and programs to perform their permitted critical functions within a secure environment.
4. Cloud Security :
Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding public internet connections. Cloud security is essential for the many users who are concerned about the safety of the data they store in the cloud. They believe their data is safer on their own local servers where they feel they have more control over the data. But data stored in the cloud may be more secure because cloud service providers have superior security measures, and their employees are security experts. On-premise data can be more vulnerable to security breaches, depending on the type of attack. Social engineering and malware can make any data storage system vulnerable, but on-site data may be more vulnerable since its guardians are less experienced in detecting security threats.
5. Internet of Things Security :
Internet of Things security focuses on protecting your internet-enabled devices that connect to each other on wireless networks. IoT security is the safety component tied to the Internet of Things, and it strives to protect IoT devices and networks against cybercrime. IoT technologies pose potential dangers to your internet safety.
That’s why it’s a good idea to protect your digital life by securing your IoT-connected devices. Here are ten ways to do that.
1. Install reputable internet security software on your computers, tablets, and smartphones.
2. Use strong and unique passwords for device accounts, Wi-Fi networks, and connected devices. Don’t use common words or passwords that are easy to guess, such as “password” or “123456.”
3. Be aware when it comes to apps. Always make sure you read the privacy policy of the apps you use to see how they plan on using your information and more.
4. Do your research before you buy. Devices become smart because they collect a lot of personal data. While collecting data isn’t necessarily a bad thing, you should know about what types of data these devices collect, how it’s stored and protected, if it is shared with third parties, and the policies or protections regarding data breaches.
5. Know what data the device or app wants to access on your phone. If it seems unnecessary for the app’s functionality or too risky, deny permission.
6. Use a trusted VPN, which helps to secure the data transmitted on your home or public Wi-Fi.
7. Check the device manufacturer’s website regularly for firmware updates.
8. Use caution when using social sharing features with these apps. Social sharing features can expose information like your location and let people know when you’re not at home. Cybercriminals can use this to track your movements. That could lead to a potential cyberstalking issue or other real-world dangers.
9. Never leave your smartphone unattended if you’re using it in a public space. In crowded spaces, you should also consider turning off Wi-Fi or Bluetooth access if you don’t need them. Some smartphone brands allow automatic sharing with other users in close proximity.