The practice of protecting sensitive information and critical information from unrecognised attacks. It’s also known as information technology security or electronic information security. With a rising number of data breaches each year the global cycle threat continues to evolve. The United States has created a cyber-security framework, to combat the proliferation of malicious code. Attackers are always looking for new ways to escape IT notice and exploit emerging weaknesses.
There are three types of cyber threats-
1.Cybercrime- individuals or groups targeting disruptions to enjoy financial gains.
2.Cyber attack- attack with the purpose of politically motivated information gathering.
3.Cyber terrorism- intended to undermine electronic systems to cause panic.
Cyber safety tips include-
1.Updating of software
2.Using of anti virus software
3.Keeping strong passwords
4.Do not click on links in emails from unknown senders
5.Avoid using insecure WiFi
Security used to be an inconvenience sometimes, but now it’s a necessity all the time.
Perimeter-based security is no longer adequate but implementing security controls within each environment creates complexity thus, to be successful in executing a zero trust strategy, organisations need a way to combine security information in order to generate the context that informs and enforce validation controls.