{"id":47149,"date":"2018-10-30T19:35:35","date_gmt":"2018-10-30T23:35:35","guid":{"rendered":"https:\/\/awesomejelly.com\/?p=47149"},"modified":"2019-10-07T21:07:10","modified_gmt":"2019-10-08T01:07:10","slug":"what-is-cyber-security","status":"publish","type":"post","link":"https:\/\/awesomejelly.com\/what-is-cyber-security\/","title":{"rendered":"What is Cyber Security?"},"content":{"rendered":"
<\/p>\n
Computers have become a major part of our modern lives. Most of the smart devices that we use nowadays are connected to the Internet and have miniature computers attached to them. These devices help us to live better lives and are collectively called as the Internet of Things (IoT).<\/p>\n
Many people have made the observation that even though devices have enabled us to be better connected, still they are not foolproof in the sense that our sensitive data can be stolen from them due to lack of security and control.<\/p>\n
Cyber security aims at protecting our computers from such theft and damage. The theft could be of different things such as hardware, software or any electronic data and the damage could be in the way the network is disrupted or misdirected to a place not originally intended.<\/p>\n
Cyber security is a growing field that encompasses the complex web of realities that constitute the modern world and includes functional areas as diverse as politics and technology. This is amply made clear by the previous American presidential elections of 2016 wherein the Russians were alleged into have interfered in the election process by trying to influence the decision in favor of Trump.<\/p>\n
The domain of cyber security is very vast and requires a general introduction to help you understand it better. This website\u00a0<\/a>will help you with the basics of cyber security that will enable you to dive deep into the vast ocean of computer technology.<\/p>\n From our side, this article provides you with a clear overview of the types of security breaches, the different sectors of industry that are at risk and finally, how corporations can train their employees on having a better work culture that enhances cyber security.<\/p>\n <\/p>\n Security breaches are appropriately entitled as vulnerabilities as they expose the drawbacks and loopholes that are present in current computer systems. They mainly aim to disrupt the preferred system of functioning by their malevolent attacks.<\/p>\n There are many types of security breaches that are explained below:-<\/p>\n <\/p>\n The earlier forms of security breaches were individual ones. There are security breaches against nations as well that are conducted by non-state actors like terrorists, hackers and spies and this is why it is extremely\u00a0 important for us to understand its current implications in our daily lives.<\/p>\n Here we explain three major forms of global cyber security threats as given below:-<\/p>\n <\/p>\n In modern times, the scope of cyber security is all encompassing as it includes the following:<\/p>\nTypes of Security Breaches<\/h2>\n
\n
Why Cyber Security is Extremely Important<\/h2>\n
\n
The Scope of Cyber Security<\/h2>\n
\n
Cyber Security Work Culture<\/h2>\n