Cyber security is the application of technologies, processes, and control to protect systems, networks, programs, devices, and data from cyber-attacks. It aims to reduce the risk of cyber-attacks and protect against the unauthorized exploitation of systems, networks, and technologies.

What is a cyber-attack?

A cyber-attack is a deliberate attempt by external or internal threats or attackers to exploit and compromise the confidentiality, integrity, and availability of information systems of a target organization or individual(s). Cyber-attackers use illegal methods, tools, and approaches to cause damage and disruption or gain unauthorized access to computers, devices, networks, applications, and databases.

Cyber-attacks come in a wide variety. The following list highlights some of the important ones that criminals and attackers use to exploit software:

1. Malware

2. Ransomware

3. Injection attacks (e.g., cross-site scripting, SQL injection, command injection)

4. Session management and Man-in-the-Middle attacks

5. Phishing

6. Denial of service

7. Privilege escalations

8. Unpatched/Vulnerable software

9. Remote code execution

10. Brute force

As organizational assets are made up of multiple disparate systems, an effective and efficient cyber security posture requires coordinated efforts across all its information systems. Therefore, cyber security is made up of the following sub-domains:

Application Security

Application security involves implementing various defenses within all software and services used in an organization against a wide range of threats. It requires a secure application architecture design, secure code, implementation of strong data input validation, threat modeling, etc. to minimize the likelihood of any unauthorized access or modification of application resources.

Identification of Management and Data Security

Identification of management includes frameworks, processes, and activities that enable authentication and authorization of legitimate individuals to information systems within an organization. Data security involves implementing strong information storage mechanisms that ensure the security of data at rest and in transit.

Network Security

Network security involves implementing both hardware and software mechanisms to protect the network and infrastructure from unauthorized access, disruptions, and misuse. Effective network security helps protect organizational assets against multiple external and internal threats.

Mobile Security

Mobile security refers to protecting both organizational and personal information stored on mobile devices like cell phones, laptops, tablets, etc. from various threats such as unauthorized access, device loss or theft, malware, etc.

Cloud Security

Cloud security relates to designing secure cloud architectures and applications for organizations using various cloud service providers such as AWS, Google, Azure, Rack space, etc. Effective architecture and environment configuration ensure protection against various threats.

Disaster recovery and business continuity planning (DR & BC)

DR & BC deals with processes, monitoring, alerts, and plans that help organizations prepare for keeping business-critical systems online during and after any kind of a disaster as well as resuming lost operations and systems after an incident.

User Education

Formally training individuals regarding topics on computer security is essential in raising awareness about industry best practices, organizational procedures, and policies as well as monitoring and reporting malicious activities.

Best cyber security practices to prevent a breach

1. Conduct Cyber Security Training and Awareness Programs.

2. Perform risk assessments

3. Ensure vulnerability management and software patch management/updates

4. Use the principle of least privilege

5. Enforce secure password storage and policies

6. Implement a robust Business Continuity and Instance Response (BC-IR) plan

7. Perform periodic security reviews

8. Backup data

9. Use encryption for data at rest and in transit

10. Design software and networks with security in mind

Want to know more about MIT College of Railway Engineering and Research Barshi, MH.

Apply now @ https://bit.ly/2K2tT00

#MITCORER #MITCORERBarshi #TransformIndia #MIT #BTech #RailwayEngineering #railways

MIT College of Railway Engineering and Research
MIT College of Railway Engineering and Research

Written by MIT College of Railway Engineering and Research

MITCORER, Barshi launched by MIT Group is one of the finest engineering colleges which ventures into the unique field of railway and transportation.

Responses (2)