Siz Approved Courses|Lecture 03|Cyber Security|20% to siz-official
Hello steemians! How are you today? I am delighted to introduce the third lecture topic in the four week course on Cyber security. In my first lecture post I treated cyber crime. Click here to read . In my second lecture post I treated the ways in which cryber criminal carry out Cyber criminal activities. Click here to read. In this lecture post I am going to treat cyber security. Read on.
- Provides protection for end users and also end point devices
- Provides protection for data and network
- Provides security against unauthorized users
- provides confidences in the trust of users and organization which stores datas online.
There are various ways in which cryber security are been threatened or in which cryber criminals lunch attacks. I explained that in my second lecture post.
Some other threat the cryber security are
Phishing
Spear Phishing
Advanced persistent threats
There are many ways in which we can prevent our data from cryber security. Let take a look at some methods uses to protect our data.
WAYS TO OBTAIN DATA SECURITY ENCRYPTION:
This is the use of algorithm to transform normal text characters into an unreadable format. Most time users can encrypt there data to prevent the public from understanding.DATA MASKING:
This is a method of securing data through the process of hiding the main data. This is usually done by creating a take version of your data and make it appear as the main data. There by protecting the main data.DATA TONKENIZATION:
This term is often confused with data masking. Data tokenization is the process of turning meaningful data into random strings of characters called token. This token has no meaningful value and can serve as reference to the original data but cannot be used to read the original data.AUTHENTICATION:
This are recogning method use to identify users that want to gain access to a particular information or site.
Good one Post dear friend you make a very good lecture and explain in simple words thanks for sharing information with us my best wishes for you.
Regards, Faran Nabeel
Thank you very much, I feel encouraged
One can also try this Cyber Security course online.