Cyber security or information technology security is the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. It is comprised of an evolving set of tools, risk management approaches, technologies, training and best practices designing to protect networks, devices, programs and data from unauthorized access.
Purpose of cybersecurity
The purpose of cybersecurity is to help prevent cyberattacks, data breaches and identity theft and can aid in risk management. When an organization has a strong sense of network security and an effective incident response plan, it is better able to prevent and mitigate cyber-attacks.
Common Types of Cybersecurity
Network Security protects network traffic by controlling incoming and outgoing connections to prevent threats from entering or spreading on the network.
Data Loss Prevention (DLP)
Data Loss Prevention protects data by focusing on the location, classification and monitoring of information at rest, in use and in motion.
Cloud Security provides protection for data used in cloud-based services and applications.
Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS)
It works to identify potentially hostile cyber activity.
Identity and Access Management (IAM)
It uses authentication services to limit and track employee access to protect internal systems from malicious entities.
Encryption is the process of encoding data to render it unintelligible, and is often used during data transfer to prevent theft in transit.
Antivirus/anti-malware solutions scan computer systems for known threats. Modern solutions are even able to detect previously unknown threats based on their behavior.