DIAGRAM - 2 Cyber Security Elements
Application security
refers to protecting applications from threats from the outside using software, hardware, and procedures. Since applications can now be used on different networks, security has become a more and more important issue that businesses must deal with during development. Because of this, software applications are now very open to a wide range of risks. Applications need to have built-in security features and a foolproof application security routine to make it harder for unauthorised people to get into applications and change them to get to, change, steal, or delete sensitive user data.
Information Security
The purpose of digital security is threat minimization. A mechanism must exist to prevent unauthorised access to or use of sensitive data. A transmission may be intercepted and rewritten before it reaches its intended receiver, as one example. The goal of cryptography technology is to safeguard against this possible security compromise. When users are asked to prove their identities and utilise digital signatures as part of the authentication process, data security is enhanced.
Network security
means actions taken with the intention of keeping Internet users safe. Maintains the availability, authenticity, and confidentiality of data in transit. Users may be protected from harm and others can be denied access to your network if you have implemented adequate security measures.
disaster recovery
Businesses risk substantial losses if data is corrupted due to factors such as hardware failure, human mistake, hacking, or malicious software. Restoration of previously stored electronic data is essential. Creating a strategy to recover from a technological catastrophe should be part of every company's standard operating procedure.
Control admin privileges
Only reliable and trustworthy workers should be granted administrative rights. Use strong passwords to safeguard user accounts, and restrict access to important information for personnel managing admin profiles on your corporate website. Keep track of everything users do; always be on the lookout for signs of unwanted access by monitoring access logs.
Reference:
Kellton (2016). Protect your data with cyber security. Available at: www.kellton.com (Accessed:6 December 2022)

Comments
Post a Comment