Need of Cyber Security
Need of Cyber Security
Cyber security is needed for following reasons:
The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit to authorized users. Information security includes those measures necessary to detect, document, and counter threats to digital and non-digital information. Information security processes and policies typically involve physical and digital security measures to protect data from unauthorized access.
Security: It can be considered a state of freedom from a danger or risk. For example, a nation experiences security when it’s military has the strength to protect its citizens.
Information: It is an asset to all individuals and businesses. Information Security refers to the protection of these assets in order to achieve Confidentiality, Integrity and Availability (CIA).
To make the system secure, optimum level of confidentiality, availability and integrity is to be maintained.
Meaning of Confidentiality, Integrity and Availability (CIA):
Confidentiality: Protecting information from being disclosed to unauthorized parties.
Integrity: Protecting information from being changed by unauthorized parties.
Availability: To the availability of information to authorized parties only when requested.
Three main goals of Information security are:
Detection: The most important element of this strategy is timely detection and notification of a compromise. Intrusion detection systems (IDS) are utilized for this purpose.
Prevention: Security measures must be taken to protect information from unauthorized modification, destruction, or disclosure whether accidental or intentional
Response: Making important decisions or developing policy while under attack is a recipe for
disaster.
- Malicious Intent
- Sabotage
- Accident Errors
- Espionage Agents
- Register
- Encoder
- Decoder
- Flip Flop
- Write it in another language
- Keep the message in attachment
- Encrypt the message
- Send as a blind copy
- viruses
- spyware
- worm
- adware
- Tangible property
- Intangible property
- The name of a particular good or service
- Ideas contained in varied forms of expression
- Packet Filter
- Application Gateways
- Proxy Server
- Fire Proxy Service