What is cyber security ?

Cybersecurity is a set of processes, best practices, and technology solutions that help protect your critical systems and network from digital attacks. As data has proliferated and more people work and connect from anywhere, bad actors have responded by developing sophisticated methods for gaining access to your resources and stealing data, sabotaging your business, or extorting money. Every year the number of attacks increases, and adversaries develop new methods of evading detection. An effective cybersecurity program includes people, processes, and technology solutions that together reduce the risk of business disruption, financial loss, and reputational damage from an attack.

What is cyber security ? | Deepanshu tech


Why is cyber security important?

Today’s world is more connected than ever before. The global economy depends on people communicating across time zones and accessing important information from anywhere. Cybersecurity enables productivity and innovation by giving people the confidence to work and socialize online. The right solutions and processes allow businesses and governments to take advantage of technology to improve how they communicate and deliver services without increasing the risk of attack.

Types of cyber security threats

  • Phishing

Phishing is a type of social engineering that uses emails, text messages, or voice mails that appear to be from a reputable source to convince people to give up sensitive information or click on an unfamiliar link. Some phishing campaigns are sent to a huge number of people in the hope that one person will click. Other campaigns, called spear phishing, are more targeted and focus on a single person. For example, an adversary might pretend to be a job seeker to trick a recruiter into downloading an infected resume

What is cyber security ? | Deepanshu tech

  • Malware

Malware is a catchall term for any malicious software, including worms, ransomware, spyware, and viruses. It is designed to cause harm to computers or networks by altering or deleting files, extracting sensitive data like passwords and account numbers, or sending malicious emails or traffic. Malware may be installed by an attacker who gains access to the network, but often, individuals unwittingly deploy malware on their devices or company network after clicking on a bad link or downloading an infected attachment.

  • Ransomware
Ransomware is a form of extortion that uses malware to encrypt files, making them inaccessible. Attackers often extract data during a ransomware attack and may threaten to publish it if they don’t receive payment. In exchange for a decryption key, victims must pay a ransom, typically in cryptocurrency. Not all decryption keys work, so payment does not guarantee that the files will be recovered.

What is cyber security ? | Deepanshu tech

  • Insider threats
In an insider threat, people who already have access to some systems, such as employees, contractors, or customers, cause a security breach or financial loss. In some cases, this harm is unintentional, such as when an employee accidentally posts sensitive information to a personal cloud account. But some insiders act maliciously.
  • Social engineering
In social engineering, attackers take advantage of people’s trust to dupe them into handing over account information or downloading malware. In these attacks, bad actors masquerade as a known brand, coworker, or friend and use psychological techniques such as creating a sense of urgency to get people to do what they want.

What is cyber security ? | Deepanshu tech

  • Advance persistent threat
In an advanced persistent threat, attackers gain access to systems but remain undetected over an extended period of time. Adversaries research the target company’s systems and steal data without triggering any defensive countermeasures.