Computer security involves technologies and procedures designed to protect data, software, hardware and peripheral equipment. Data that is compromised or equipment that fails is costly and may cause businesses to go bankrupt. Therefore, computer security is a major concern for everyone.
A network is two or more interconnected computers that share devices and information. They may access a large computer that contains all of the company’s data. They may be located in one building or connected by telephone lines to building at a distant location. The system administrator is usually in charge of network security and uses some or all of the following:
- User ID and Passwords
Data is stored in password-protected directories. Only employees who need to work with specific accounts or other business data have access to their files.
Firewalls are designed to protect networks from malware and spyware. Malware can destroy data and lock up computers. Spyware tracks the websites visited by the user and can steal valuable information. The firewall is an interface between the network and the Internet.
- Denial of Internet Access
Some users may be denied Internet access due to websites they visit. Regardless of firewalls, users can permit downloads that can infect the network. When one computer is infected, the virus moves throughout the network.
Sometimes data is encrypted so that if unauthorized access is gained, the data is meaningless. Since password protection is used for encrypting, hackers must break two passwords.
- Online Backups
Online backups are encrypted and provide safe storage for data. If the hard drive crashes or malfunctions due to a virus, the business records can be easily restored.
Scanners are used to locate and quarantine viruses and malware that lies dormant and will attack later.
Cyber security involves technologies and processes to protect computers, networks programs, and data from unintended or unauthorized access. Cyber attacks may originate anywhere in the world. These attacks may invade networks of business, government, and financial institutions.
Cyber security may be divided into four tasks:
- Network Protection
Those who are in charge of cyber security develop software to protect networks. They try to penetrate network defenses and create better defenses.
- End User Education
An end user enters data into the computer and directs the output. End users must be knowledgeable about the dangers of cyber attacks.
- Information Security
Cyber security develops software and other technologies to keep information safe from attacks. Since attackers are constantly upgrading their methods and technologies, cyber security is a never-ending problem.
- Application Security
Applications are programs that process data, and they must be protected at all times. Without spreadsheets, word processors, and other applications, businesses would stop.
Difference Between Network Security and Cyber Security
Network security deals with keeping the entity’s data and equipment secure. Cyber security protects the entity’s Internet connection and beyond.