Cyber-security is the
practice of defending computers, servers, mobile devices, electronic systems,
networks, and data from malicious attacks. It's also known as information
technology security or electronic information security. The term applies in a
variety of contexts, from business to mobile computing, and can be divided into
a few common categories.
The field is growing in
importance due to increasing reliance on computer systems, the Internet and
wireless networks such as Bluetooth and Wi-Fi, and due to the growth of
"smart" devices, including smartphones, televisions and the various
tiny devices that constitute the Internet of things. Due to its complexity,
both in terms of politics and technology, it is also one of the major
challenges of the contemporary world.
Cyber security has never
been simple. And because attacks evolve every day as attackers become more
inventive, it is critical to properly define cyber security and identify what
constitutes good cyber security.
Cyber security also
refers to the body of technologies, processes, and practices designed to
protect networks, devices, programs, and data from attack, damage, or
unauthorised access. Cyber security may also be referred to as information
technology security.
In a computing context,
security comprises cyber security and physical security -- both are used by
enterprises to protect against unauthorised access to data centres and other
computerised systems. Information security, which is designed to maintain the
confidentiality, integrity and availability of data, is a subset of
cyber security.
Resources
:
1-https://us.norton.com/internetsecurity-malware-what-is-cybersecurity-what-you-need-t...
2- www.ibm.com/Security/Solutions
You have gone from AI to cyber security without giving the reader a clue as to why the sudden change of topic - remember it should be a coherent and consistent theme (which you can link together as AI and cyber security could work together) but you have to add commentary to say HOW this is linked and where you are going with the blog research and why...
ReplyDeletePhishing Testing I have read all the comments and suggestions posted by the visitors for this article are very fine,We will wait for your next article so only.Thanks!
ReplyDelete