What are the types of Cyber security?

Aug 12, 2019Data Protection & Privacy

Cybersecurity relates to the protection of computers and computer systems from prohibited access and damage. Cybersecurity covers the protection of all digital devices including PCs, mobile devices, servers, and any and all other IT related devices.

Cybersecurity

Cybersecurity

Cybersecurity relates to the protection of computers and computer systems from prohibited access and damage. Cybersecurity covers the protection of all digital devices including PCs, mobile devices, servers, and any and all other IT related devices.

Cybersecurity does not only relate to external threats posed by malicious bad actors, but also from internal actions within businesses, either deliberately or accidental.

Cybersecurity is essential as it prevents personal data from being stolen which could cause significant damage to a business or their customers. Businesses that fall prey to cybersecuirty breaches can suffer sometimes irreparable damage to their reputation and/or significant damages in terms of fines and litigation fees and payouts.

If a business fails to properly insulate themselves from cyber security threats they may stand to be accused of negligence. A business that has done all they can to protect against data loss, and that has a disaster recovery plan in place in the event of an attack, will significantly mitigate the impact of any cybersecurity incidents that arise.

Cybersecurity Categories

The general categories of cybersecurity are:

  • Information Security: This is protecting personal data ensuring it is kept private.
  • Application Security: This is were digital devices and software are kept free of threats that look to steal, destroy, corrupt or access data.
  • Network Security: This is where a computer network is secured from intruders, by detecting, prohibiting and responding to malicious threats.
  • Operational Security: This relates to how information is classified and the processes used to protect and access that information, and how and where that information is stored.
  • Disaster recovery & business continuity: this determines what happens in an cybersecurity incident, how a business is able to continue functioning, and how data may be retrieved and damage mitigated.
  • End User Education: This relates to how individuals interact with devices and software. Often cybersecurity breaches are related to user actions, such as opening an infected file, or providing security data to a malicious actor. End user education can dramatically reduce risks posed to a business and individuals.

Typical types of attacks include Ransomware, Malware, or Social Engineering attacks..

Ransomware

Ransomeware is where a computer system is shut down, and will only be unlocked if a ransom is paid. The most recent and wide-scale example of this was the WannaCry Ransomware that shut down computers across the globe. WannaCry took advantage of a defect in an older version of Microsoft’s Windows operating system. Microsoft had issued a patch at the time, but many end-users had failed to implement the patch, making their computers vulnerable to attack. It is estimated that the costs, just to the National Health Services (NHS) in the UK, was £92 million. The attack was believed to have come from North Korea, but the exploit was originally built by the US National Security Agency (NSA).

Malware

Malware is is a malicious software that can cause damage to a file or software, this can take the form of worms, viruses, or trojans. A Trojan horse, for example, will disguise itself as a legitimate file or program. Once activated, Trojan horses can enable cyber-criminals to spy on you, steal sensitive data, and/or gain a backdoor to your system.

Social engineering

Social engineering is an attack that tricks end-users into providing security information so that the malicious actor can gain access to private data, such as banking details. Examples of social engineering attacks include vishing, phishing, spear phishing or smishing.

Contact Us

Related Articles

Related

What is the GDPR?

What is the GDPR?

You would be forgiven for thinking that data protection regulation only started in 2018 with the introduction of the EU's General Data Protection Regulation (GDPR).Data Protection Law You would be forgiven for thinking that data protection regulation only started in...

read more

Head Office 

Legisia Legal Services

The North Colchester Business Centre

340 The Crescent

Colchester

Essex, CO4 9AD

Cases are conducted nationwide & internationally

Additional consultation Address (Not Postal)

50 Liverpool Street

London EC2M 7PY

Pin It on Pinterest

Share This