Essay on cyber
security(150-200 words)
Answers
Cyber analytics is a branch of analytics that systematically provides the analysis of the data pertaining to the domain of computers and network. It basically, tells the story behind cyber data. Cyber analytics is used to support computer security, computer or network administration, auditing, and several other application areas.”
Implementation
Cyber Security Monitoring
To perform adaptive cyber-security analytics using a computer implemented method that includes receiving a report on a network activity, It works as follows, a scoring method is used wherein a score responsive to the network activity is calculated. The score indicates a likelihood of security breach. This score is validated and the scoring model is automatically updated, responsive to the results of the validation. If the score falls within a threshold value of a security violation rule, the network activity is reported as suspicious. This basically relates generally to cyber-security monitoring, and more particularly to monitoring incoming security events to determine if any activity is violating security rules.
Answer:
The importance of cyber security in modern Internet age
The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. Nevertheless, they can also be planned or intentional, like hacking or access by unauthorized users. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.
As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It can be also be defined as all operations and activities that are undertaken to minimize threats and any kind of vulnerabilities, and enforcing required policies for prevention, data assurance, recovery and other cyber security related operations. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction.