Explore chapters and articles related to this topic
Cybersecurity Basics
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
Cybersecurity can be classified into multiple elements as mentioned below: Network security (NS)Information security (IS)Application security (AS)Business continuity planning (BCP)/disaster recoveryLeadership commitmentOperational security (OPSEC)End-user education
Jamming Detection in Electromagnetic Communication with Machine Learning: A Survey and Perspective
Published in Kim Phuc Tran, Machine Learning and Probabilistic Graphical Models for Decision Support Systems, 2023
Jonathan Villain, Virginie Deniau, Christophe Gransart
Cybersecurity is about protecting computers, servers, mobile devices, electronic systems, networks and data against malicious attacks. It is also called computer security or information systems security. You can encounter it in many contexts, from corporate IT to mobile devices. It can be divided into several categories which are network security for protecting the computer network against intruders, application security which aims to protect software and devices against threats, information security which ensures data integrity and confidentiality, operational security which includes the processes and decisions related to the processing and the protection of data and others like disaster recovery and User training.
Cyber Security Techniques, Architectures, and Design
Published in Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Holistic Approach to Quantum Cryptography in Cyber Security, 2023
Sita Rani, Aman Kataria, Meetali Chauhan
Cyber security is playing a very vital role to protect different kinds of resources in a number of application areas. Prominent ones are corporate, government organizations, financial organizations, healthcare, and the military, where a huge volume of sensitive data is gathered, transmitted, processed, and stored over electronic devices (Patel, Srinivasan, Chang, Gupta, and Kataria 2020, Gupta 2017, Gupta and Rani 2013). In all these application areas, the role of cyber security can be divided into network security (Gupta, Rani, and Pant 2011), application security, information security, and operational security, as discussed below:Network Security: It helps to secure client data transmitted over different networks. It also facilitates secure access of data and safeguards against network threats (Kataria, Ghosh, Karar, Gupta, Srinivasan, and Hu 2020). Different methods to ensure network security are firewalls, network segmentation, authorized access control, remote access VPN, zero trust network access (ZTNA), intrusion prevention systems (IPS), hyperscale network security, cloud network security, etc.Application Security: The main aim to ensure application security is to protect data or code in an app against any theft. It aims to consider all the phases of the development starting from design, development, and finally deployment. It focuses on all the constituents of an application, e.g., software, hardware, and different methods of an application to reduce security threats. Application security revolves around authentication, authorization, encryption, logging, and testing of the final application.Information Security: It is an integration of mechanisms and policies designed to protect the information stored and transmitted in cyberspace against unauthorized access and manipulations. The main information security principles are confidentiality, integrity, and availability.Operational Security: It ensures the management of different types of cyberthreats which may expose sensitive data to cyberattacks. Operational security is practiced with different analytical operations like behavioral analysis and analysis of social media patterns. Some of the important operational security practices are to customize management processes, practice dual control, and use process automation.
On the scale of Cyberspace and Cybersecurity
Published in International Journal of Computers and Applications, 2022
If we look deep into the overall field of Cybersecurity, it can have various aspects and directions like [5]: Network security;Information security;Application security;Business continuity planning/disaster recovery;Leadership commitment;Operational security; andEnd-user education.Our understanding is that Cybersecurity is not just a one-time measure. But rather, it is a continuous process of security awareness, strategic planning, implementation, monitoring, and evaluation. The hackers are not sitting idle – as we try to find more effective defense mechanisms, so are they spending their time finding crafty methods to breach the security. As the scale of Cyberspace increases, Cybersecurity would remain a wide field in the IT environment, which would range from human behaviors to the technological procedures that would directly or indirectly impact the security of valuable resources stored and connected to the apparently scale-less, ever-expanding network environment.