Siz Approved Courses|Lecture 03|Cyber Security|20% to siz-official

in Steem Infinity Zone3 years ago (edited)

INTRODUCTION

Hello steemians! How are you today? I am delighted to introduce the third lecture topic in the four week course on Cyber security. In my first lecture post I treated cyber crime. Click here to read . In my second lecture post I treated the ways in which cryber criminal carry out Cyber criminal activities. Click here to read. In this lecture post I am going to treat cyber security. Read on.

images (1).jpegsource

CYBER SECURITY

Cyber security is simply the protection of internet connected devices or system such as hardware,software and data from cyberthreats and attacks. This protection is used by individuals and organisation to guide and protect their data against unauthorized access from cybercriminals. A very good cyber security system can protest a user or an organization system against malicious attacks designed to access, alter, delete, destory and spy on the users or an organization secret and sensitive data. Cyber security Offers lots of benefit to the users an organization as it
  • Provides protection for end users and also end point devices
  • Provides protection for data and network
  • Provides security against unauthorized users
  • provides confidences in the trust of users and organization which stores datas online.

TYPES OF CYBER SECURITY THREATS

There are various ways in which cryber security are been threatened or in which cryber criminals lunch attacks. I explained that in my second lecture post.
Some other threat the cryber security are

  • Phishing

  • Spear Phishing

  • Advanced persistent threats
    There are many ways in which we can prevent our data from cryber security. Let take a look at some methods uses to protect our data.

    WAYS TO OBTAIN DATA SECURITY

  • ENCRYPTION:

    This is the use of algorithm to transform normal text characters into an unreadable format. Most time users can encrypt there data to prevent the public from understanding.

  • DATA MASKING:

    This is a method of securing data through the process of hiding the main data. This is usually done by creating a take version of your data and make it appear as the main data. There by protecting the main data.

  • DATA TONKENIZATION:

    This term is often confused with data masking. Data tokenization is the process of turning meaningful data into random strings of characters called token. This token has no meaningful value and can serve as reference to the original data but cannot be used to read the original data.

  • AUTHENTICATION:

    This are recogning method use to identify users that want to gain access to a particular information or site.

Cc:
@siz-official
@cryptokraze.

Sort:  
 3 years ago 

Good one Post dear friend you make a very good lecture and explain in simple words thanks for sharing information with us my best wishes for you.

Regards, Faran Nabeel

Thank you very much, I feel encouraged

One can also try this Cyber Security course online.

Coin Marketplace

STEEM 0.18
TRX 0.13
JST 0.029
BTC 58157.69
ETH 3122.82
USDT 1.00
SBD 2.42