wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cyber Security Control

profile
Eish 7
Aug 29, 2022
0 Likes
0 Discussions
87 Reads

-What is Cyber Security Control Cyber ?

 

Security is a process that’s designed to protect networks and devices from external threats. Businesses typically employ to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services.

The world of Cyber Security revolves around the industry standard of confidentiality, integrity, and availability, Privacy means data can be accessed only by authorized parties; integrity means information can be added, altered, or removed only by authorized users; and availability means systems, functions, and data must be available on-demand according to agreed-upon parameters.

The main element of Cyber Security is the use of authentication mechanisms. For example, a user name identifies an account that a user wants to access, while a password is a mechanism that proves the user is who he claims to be.

 

-Types of Cyber Security Control 

 

•DOS

•Malware

•Man in the middle

•Phishing

 

-What Motivates Cyber Criminals? 

The main motive behind the cybercrime is to disrupt regular business activity and critical infrastructure. Cybercriminals also commonly manipulate stolen data to benefit financially, cause financial loss, damage a reputation, achieve military objectives, and propagate religious or political beliefs. Some don’t even need a motive and might hack for fun or simply to showcase their skills.

So who are these cybercriminals? Here’s a breakdown of the most common types:

•Gary-Hat Hacker

•White-Hat Hacker

•Suicide Hacker

•Cuber Terrorist 


-Who are cyber security experts?

 

So what do Cyber Security experts actually do? On any given day, they:

 

•Find, test, and repair weaknesses within a company’s infrastructure

 

•Monitor systems for malicious content

 

•Identify network breaches

 

•Install regular software updates, firewalls, and antivirus protection

 

•Strengthen areas where attacks may have occurred

 


Comments ()


Sign in

Read Next

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Deadlock and Starvation

Blog banner

Evolution of operating systems

Blog banner

Mobile Survey

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

What is Virtual Memory

Blog banner

Telegram and it's features

Blog banner

Operating Systems

Blog banner

Odoo

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Threats To Computer System

Blog banner

Memory Management

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Python as a tool for Data science task & project

Blog banner

Deadlock and Starvation

Blog banner

Whatsapp Messenger

Blog banner

Race Condition in Operating Theatre

Blog banner

INTERNET

Blog banner

Virtual machine

Blog banner

Data Mapping

Blog banner

Memory Management in an Operating System

Blog banner

Linux -V Server Virtual Machine

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Defining youtubr

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Modern operating system

Blog banner

Major achievement

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Consumer to consumer business mode

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

Service stratergy principles

Blog banner

Virtual Memory

Blog banner

Deadlock

Blog banner

MEMORY HIERARCHY

Blog banner

Loneliness

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Risk mitigation and management

Blog banner

OPERATING SYSTEM

Blog banner