Information security is a high priority for protection of the company's information and it is critical to implement an information security procedure to combat misuse of this information.
Answers
Answer:
Cyber Security
Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.
Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.
Private enterprises use cyber security and online data protection to help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.
Shortcomings of On-Premise Approaches to Cyber Security
Typically, public and private organizations defend their web-based assets by deploying cyber security appliances in data centers, such as hardened routers, network firewalls, and web application firewalls (WAF). Such devices provide a valuable layer of web security, but as a sole means of defense they have significant shortcomings. For example:
Such devices inspect and filter incoming traffic, and easily become a performance chokepoint and a single point of failure for cyber attackers to target.
Because they are inside the data center, such devices cannot protect against attacks that seek to block the internet lines that link the data center to telcom carriers.
As a sole defense against cyber security threats, on-premise appliances and software burden an organization in terms of capital expenditures due to their short lifecycles and the need for ongoing operations and maintenance