6. it security and safety


Why is IT security important?



Download 23,34 Kb.
bet2/3
Sana16.01.2023
Hajmi23,34 Kb.
#899840
1   2   3
Bog'liq
6. IT security and safety

Why is IT security important? 
Since the advent of the internet, malicious hackers have worked tirelessly to develop ever more ingenious ways to access sensitive and confidential information for monetary gain. 
Cybercriminals exploit vulnerable IT networks in many ways, and the techniques they use are becoming ever more difficult to counter. Today, an IT security team must mitigate multiple cyber threats including malware, phishing, man-in-the-middle attacks, denial-of-service attacks, SQL injection, zero-day exploits, and DNS tunneling.
Internal and external threats 
Every IT security strategy must consider internal threats too. This could mean protecting databases from intentional sabotage or restricting potential thieves from accessing confidential account details, but it covers unintentional security flaws too.
For example, if a company employee were to re-use credentials for a company email account that had already been involved in a data breach, this could give hackers a way into that company's network.
With such a rapidly evolving threat landscape, no single IT security measure can alleviate every threat to a network. As a result, IT security can now be categorized into a range of different types that work together to protect an organization's data from attack, regardless of how or where the attack takes place and who carries it out. 
Types of IT security 
There’s no such thing as a universal IT security strategy. Every organization must quantify the specific risks to its IT networks and work out where to concentrate its efforts and resources. That process involves evaluating the following security threats individually. 
Network security 
Network security is required to protect your hardware and software networks from unauthorized access. In many ways, it's the most significant strand of IT security to consider as it's these networks that contain the data any IT security strategy is designed to protect. 
This type of IT security safeguards against cybercriminals who could steal data from your servers and databases, or prevent you and your team from gaining access to them. 
Good network security should ensure that your network remains safe and reliable to operate within and is secured against attacks.
Cybersecurity 
Cybersecurity, also often referred to as internet security, concerns the protection of data that is sent or received over the internet. It's a catch-all term for any protection in an IT security strategy that mitigates online threats.
Cybersecurity software, like antivirus and firewalls, monitors internet traffic for suspicious activity, blocking anything deemed malicious or alerting security teams to its presence. 
Although sometimes classed as a separate branch of IT security, cloud security also fits neatly under the cybersecurity umbrella. 
With so many services now migrating to public i.e. software-as-a-service (SaaS), private, or hybrid cloud computing platforms, these virtual gateways are becoming ever-popular entry points for internet crooks. 
Specific security protocols exist to protect cloud services including cloud data encryption, cloud access security brokers (CASB), cloud-based unified threat management (UTM), and more.

Download 23,34 Kb.

Do'stlaringiz bilan baham:
1   2   3




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©www.hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish