[ColorOS News] Traverse through Technology - Cyber Security

 View:18854    Reply:29 | Posted at 3-3-2021 23:56:12 | Display all floors |   Copy
Hello ColorOS Super Fans,

How's the Banter?


It is Enrapture to see you all again with my another thread. I am getting utterly enlivened whenever I am getting ready to link up with you all. I need everyone here to create this space more interactive by adding your thoughts, give your feedbacks, comments, views about this topic. I am bright-eyed and bushy-tailed to catch you all in comment section.

In terms of Development, Technology plays a vital role. Nation's growth depends up on how the technology has widely used across the nation and also it depends on how effectively it reached to end-users. Today I have arrived with the glorious Topic which can amaze you.Cyber Security.  Interesting Isn't it!!!!
So Kindly take your time, Sit back and relax. AreYou Ready?!!!  Here We Go!!!!!!!!!!

cyber-security-1200-620x413.jpg

What is Cyber Security?

Cyber security might not seem like an emerging technology, given that it has been around for a while, but it is evolving just as other technologies. Thats in part because threats are constantly new. The malevolent hackers who are trying to illegally access data are not going to give up any time soon, and they will continue to find ways to get through even the toughest security measures.

password.gif

World class measurement and testing laboratory encompassing a wide range of areas of computer science, mathematics, statistics, and systems engineering, NISTs cybersecurity program supports its overall mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through research and development in ways that enhance economic security and improve our quality of life. The need for cybersecurity standards and best practices that address interoperability, usability, and privacy continues to be critical for the nation. NISTs cybersecurity programs seek to enable greater development and application of practical, innovative security technologies and methodologies that enhance the countrys ability to address current and future computer and information security challenges.

Cyber Security in Market

Cybersecurity jobs is growing three times faster than other tech jobs. Also, the need for proper cyber security is so high that by 2021, $6 trillion will be spent globally on cybersecurity. You must note that however challenging the field is it also offers lucrative six-figure incomes, and roles can range from ethical hacker to security engineer to Chief Security Officer, offering a promising career path for someone who wants to get into and stick with this evergreen trending technology.

giphy.gif

The term Cybersecurity to designate only security practices related to the defensive actions involving or relying upon information technology and/or OT environments and systems. Within this paper, we are aiming to explain cybersecurity and describe the relationships among cybersecurity, information security, OT security, IT security, and other related disciplines and practices, e.g. cyber defence, related to their implementation aligned with the planned or existing cybersecurity strategy at the national level. In the case study given example of The National Cybersecurity Strategy of the Republic of Croatia and Action plan is presented and elaborated. The Strategy's primary objective is to recognize organizational problems in its implementation and broaden the understanding of the importance of this issue in the society.

What is Cyber Security?

Cybersecurity encompasses a broad range of practices, tools and concepts related closely to those of information and operational technology (OT) security. Cybersecurity is distinctive in its inclusion of the offensive use of information technology to attack adversaries. Use of the term cybersecurity as a key challenge and a synonym for information security or IT security confuses customers and security practitioners, and obscures critical differences between these disciplines.


tenor.gif

Cybersecurity has been practiced in military circles for over a decade. In recent years, the term has appeared in a variety of contexts, many of which have little or no relationship to the original meaning of the term. Misuse of the term obscures the significance of the practices that make cybersecurity a superset of information security, operational technology (OT) security and IT security practices related to digital assets. With the understanding of the specific environment, cyber defence analyses the different threats possible to the given environment. It then helps in devising and driving the strategies necessary to counter the malicious attacks or threats.

0_ZnNHGO20RCbUGatL.gif

A wide range of different activities is involved in cyber defence for protecting the concerned entity as well as for the rapid response to a threat landscape. These could include reducing the appeal of the environment to the possible attackers, understanding the critical locations & sensitive information, enacting preventative controls to ensure attacks would be expensive, attack detection capability and reaction and response capabilities. Cyber defence also carries out technical analysis to identify the paths and areas the attackers could target.

00086---desk-anim---v0.3.gif

What is Cyber Security?

Various companies and Governments taking many measures to prevent the cyber-crime. This paper mainly focuses on trends, challenges and cyber ethics in the field of cyber security. Cyber incidents emphasize the importance of staying up-to-date on global cybercrime trends, especially concerning the use of mobile and personal computing devices.


Today man is able to send and receive any form of data may be an e-mail or an audio or video just by the click of a button but did he ever think how securely his data id being transmitted or sent to the other person safely without any leakage of information?? The answer lies in cyber security. Today Internet is the fastest growing infrastructure in every day life. In todays technical environment many latest technologies are changing the face of the man kind. But due to these emerging technologies we are unable to safeguard our private information in a very effective way and hence these days cyber crimes are increasing day by day.

1_ktMRyTnut5YK_0LoEJebUA.gif

Today more than 60 percent of total commercial transactions are done online, so this field required a high quality of security for transparent and best transactions. Hence cyber security has become a latest issue. The scope of cyber security is not just limited to securing the information in IT industry but also to various other fields like cyber space etc.
Even the latest technologies like cloud computing, mobile computing, E-commerce, net banking etc also needs high level of security. Since these technologies hold some important information regarding a person their securit has become a must thing.

hackers.gif

Enhancing cyber security and protecting critical information infrastructures are essential to each nation's security and economic wellbeing. Making the Internet safer (and protecting Internet users) has become integral to the development of new services as well as governmental policy. The fight against cyber crime needs a comprehensive and a safer approach. Given that technical measures alone cannot prevent any crime, it is critical that law enforcement agencies are allowed to investigate and prosecute cyber crime effectively. Today many nations and governments are imposing strict laws on cyber securities in order to prevent the loss of some important information. Every individual must also be trained on this cyber security and save themselves from these increasing cyber crimes.

cdcf1d634cd7dcb1b9f5fc7ce321a9ed.gif

Cyber crime is a term for any illegal activity that uses a computer as its primary means of commission and theft. The U.S. Department of Justice expands the definition of cyber crime to include any illegal activity that uses a computer for the storage of evidence. The growing list of cyber crimes includes crimes that have been made possible by computers, such as network intrusions and the dissemination of computer viruses, as well as computer-based variations of existing crimes, such as identity theft, stalking, bullying and terrorism which have become as major problem to people and nations. Usually in common mans language cyber crime may be defined as crime committed
using a computer and the internet to steel a persons identity or sell contraband or stalk victims or disrupt operations with malevolent programs. As day by day technology is playing in major role in a persons life the cyber crimes also will increase along with the technological advances.


TRENDS CHANGING CYBER SECURITY

--> Web Servers
--> Cloud computing and its services
--> APTs and targeted attacks
--> Mobile Network
--> IPv6: New internet protocol
--> Encryption of the code

cyber-security.gif

ROLE OF SOCIAL MEDIA IN CYBER SECURITY

Socialmedia plays a huge role in cyber security and should be checked if it has originated from atrusted and a reliable source and that they arenot altered. Authenticating of these documentsis usually done by the anti virus software presentin the devices. Thus a good anti virus software isalso essential to protect the devices from viruses. As we become more social in an increasinglyconnected world, companies must find newways to protect personal information.

--> Malware scanners
--> Firewalls
--> Anti-virus software
--> Access control and password security
-->  Authentication of data

orange.gif


In 2020, NIST prioritized helping individuals and organizations shift to a more online environment to keep people safe and our economy productive. As NIST looks ahead to the “new normal,” we plan to build on lessons learned during the pandemic and to be even more strategic in anticipating and tackling the many challenges ahead. We’ve made New Year’s resolutions: to increase our attention on managing cybersecurity risks as part and parcel of the larger enterprise risk, to pay greater heed to the intersection between cybersecurity and privacy, to stress the cybersecurity of systems versus components, and to engage more forthrightly internationally and in our cross-cutting standards work.

sdfas.JPG


Computer security is a vast topic that isbecoming more important because the world isbecoming highly interconnected, with networksbeing used to carry out critical transactions.Cyber crime continues to diverge down differentpaths with each New Year that passes and sodoes the security of the information. The latestand disruptive technologies, along with the newcyber tools and threats that come to light each day, are challenging organizations with not onlyhow they secure their infrastructure, but howthey require new platforms and intelligence todo so. There is no perfect solution for cybercrimes but we should try our level best tominimize them in order to have a safe andsecure future in cyber space.

Cybersecurity Strategy, Cyber Operations and Security Risk Management.

--> Cyber operations
--> Cybersecurity risk management
--> Cyber resiliency
--> Cyberattack model (intrusion Kill Chain)
--> Cyber resiliency situational awareness
--> National cybersecurity strategy and action plan

PS-040820-Cybersecurity-Remote-Working-Tim-Peacock-web.gif

What is Cyber Security?

Cybersecurity is a necessary consideration for information technology as well as Internet services. We need to recognize the importance of different types of risks that exist in the online world Enhancing cyber security and protecting critical information are essential to nation's security and economic being. Whenever we think about the cyber security we think of "Cyber Crime" increasing day by day.


The government has a major role to play in stimulating progress toward higher levels of cybersecurity. Reducing vulnerabilities is the high-leverage area for increasing cybersecurity. An operations-focused approach is needed. Many government agencies can be used as best-practice examples of enforcing existing regulations. Limitations of national cybersecurity strategy are related to interrelations and interconnections between many actors at many hierarchical levels. Nowhere has technological development been more dynamic and comprehensive than in the area of communication and information technology. The focus has always been on the rapid development and introduction of new services and products, while the security-related aspects usually had little influence on the broad acceptance of new technologies.

That's all Folks for now.
If you are looking for some other cool and interesting tech stuff, do follow @GowthamMadeswaran in ColorOS Community and explore some wide technical content.  Comment your views below and share the candies if you would love to share the joy pals. I'm bright eyed and bushy tailed to catch you call at comment section.

Have a Great Day !!!
Gowtham M
UID
3826479

Lv2.Plastic

Candy
3
Posted at 2-4-2021 22:06:47 FromA37fMobile phone | Display all floors
New verjion
UID
3829740

Lv2.Plastic

Candy
2
Posted at 3-4-2021 17:00:00 FromF1fMobile phone | Display all floors
Hallo
UID
3829817

Lv2.Plastic

Candy
2
Posted at 3-4-2021 20:35:09 FromA37fwMobile phone | Display all floors
Hi
UID
3829914

Lv2.Plastic

Candy
2
Posted at 4-4-2021 00:08:43 FromCPH1909Mobile phone | Display all floors
Dayman10.000 sedans. Kadana
UID
3829846

Lv2.Plastic

Candy
4
Posted at 4-4-2021 06:36:39 FromCPH1803Mobile phone | Display all floors
Yes
UID
3829846

Lv2.Plastic

Candy
4
Posted at 4-4-2021 06:37:10 FromCPH1803Mobile phone | Display all floors
Hellow
UID
3752893

Lv2.Plastic

Candy
3
Posted at 4-4-2021 14:13:47 FromCPH1909Mobile phone | Display all floors
Hii
UID
3441631

Lv2.Plastic

Candy
3
Posted at 4-4-2021 23:59:34 FromCPH1909Mobile phone | Display all floors
This is a new function
UID
3830662

Lv2.Plastic

Candy
2
Posted at 5-4-2021 09:09:07 FromCPH1909Mobile phone | Display all floors
Hi
123>
Return to list
You cannot reply without login Login | Register Now!

Point rules of this section

ColorOS Home/ColorOS Twitter/ColorOS Facebook/OPPO Home
2005-2021 OPPO copyright (Copyright@2013-2019 coloros.com, All Rights Reserved)
回复 Return to list Back to top