Cyber Security (a.k.a Ethical Hacking)

According to Oxford “The word cyber is connected with electronic communication networks, especially the Internet”. Ethical hacking is the most commonly used name to represent Cyber Security.

Cyber Security is securing information, network, systems, devices, etc., which are connected or available on the Internet. It often has multiple subjects which are information security, penetration testing, etc.,

It mainly deals with programming, networking, virtualizations, analysis, enumeration, etc., which are the key skills to protect any system, network or data.

Enumeration is the key for the red team (offensive security teams) and the log file is the key for the blue team (defending security teams or incident response teams).

This involves in Penetration Testing, Vulnerability Assessment, Threat Hunting, Digital Forensics, Report Writing, Risk Management, Cyberlaw & Ethics, Secure Coding, Authentications, Algorithms, Wireless Security, etc.,

According to Wikipedia, “Computer security, cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.”

Cisco defined this in very simple words, “Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.”

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

According to Kaspersky “Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.”

Please feel free to reach out to me here.

Leave a Comment

5 × 4 =

This site uses Akismet to reduce spam. Learn how your comment data is processed.