Beginners | Full Summury | Everything that u
need to know about Cyber Security
Cyber security is the practice of protecting computers servers and
networks from digital attacks theft and damage cyber security is critical
for individuals businesses and organizations to protect against cyber
threats such as viruses worms and ransomware. In this video we will tell
you the top 10 reasons why you should learn cyber security along with a
few cyber security skills with this video. The next section is how to
become a cyber security engineer followed by the cyber security career
path. Cyber security is the body of Technologies processes and practices
designed to protect networks computers programs and data from Attack
damage or unauthorized access or misuse of authorized asset. The goal
of cyber security is to reduce the risk of cyber attacks and protect
organizations and individuals from the intentional and unintentional
exploitation of security weaknesses and systems networks and
Technologies. Hackers are becoming smarter and more creative with
their malware 's and how they bypass virus scans and firewalls still baffle
many people let 's go through some of the most common types of cyber
dark snow. I've listed out eight cyber attacks that I 've played us since
the beginning of the internet.
Cyber security comprises of cyber security and physical security used by
Enterprises to protect against unauthorized access to data centers and
other computerized systems. Cyber security can help prevent against
cyber attacks data breaches identity theft and can Aid in Risk
Management so when an organization has a strong sense of network
security and an effective incident response plan it is better able to
prevent and mitigate these attacks. Data must not be changed in transit
and steps must be taken to ensure that data can not be altered by
unauthorized people for example in a breach of confidentiality these
measures include file permissions and user access controls. Backup
backup or redundancies must be available to restore the affected data to
its correct State last but not least is availability availability. A
vulnerability refers to a known weakness of an asset that can be
exploited by one or more attackers. Most vulnerabilities are exploited by
automated Dockers and not a human typing on the other side of the
network next testing for vulnerabilities is critical to ensuring the
continued security of your systems.
Risk is basically threat multiplied by the vulnerability you can reduce the
potential for Risk by creating and implementing a risk management plan.
Risk management is the key to cyber security so now let me go through
a scenario to actually understand how cyber security actually defend an
organization against very manipulative cybercrime. The ARP can
orchestrate a chain of events that ultimately prevents the company from
encountering a serious security disaster. Incident response platform
organized all of the people processes and Technology to identify and
contain the problem find the source of the attack fix the vulnerability and
notify all affected parties. In the past a security breach this large would
have required Bob 's company to involve several agencies and third
parties to solve the problem a process that could have taken months.
, The expression hackers may go back a long time and have many
different connotations or definitions as far as computers go some of the
earliest hackers were members of the tech Model Railroad Club at the
Massachusetts Institute of Technology. The definition of hacking or
hackers has changed particularly in the 1980s and in part as a result of a
couple of people namely Robert T Morris who was a Cornell graduate who
Unleashed a piece of software that was called a worm on what was an
early version of the internet firm went on to cause a lot of damage.
MIT has a long and storied history of hacking and sometimes if a
computer-related nature which in this case happens to be true.
Sometimes you might want to hack just to prove a political point or any
point for that matter in the case again Bill Gates had donated some
money to the MIT which allowed them to have a new building and he was
coming to MIT to give a talk about Microsoft Windows and its systems.
Sometimes you may want to hack into your own system before
publishing it out to the public. You may also want to find all the problems
that exist in your system for putting them out and deploying them so
that you can keep these attackers from getting in and stealing critical or
sensitive information. The same sort of idea is the last one where we 're
just going to talk about and that is ethical hacking. An ethical hacker is
somebody who thinks like a black hat hacker or things like somebody
who's intent on breaking into your systems but follows a moral compass
that 's more in line with probably the majority of the population so their
intent is to look for bad things and get them fixed so that bad things
don't happen ethical hackers aren't out to destroy anything and they 're
not out to break anything unless it 's deemed to be acceptable as a part
of the engagement.