What Are the Types of Cyber Security?
๐๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- Protects an applicationโs functionality and data from malicious attacks and unauthorized access. This may include output encoding, input validation, and authentication/authorization controls.
๐๐น๐ผ๐๐ฑ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- Secures information and data on a cloud computing service. Data in the cloud needs protection at the application, network, and physical levels.
๐๐ฟ๐ถ๐๐ถ๐ฐ๐ฎ๐น ๐๐ป๐ณ๐ฟ๐ฎ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- Protects a countryโs vital infrastructure (such as transportation, energy, and communication systems) from cyber attacks. Includes risk identification and assessment, prevention and mitigation measures, and plans for response and recovery.
๐๐ป๐๐ฒ๐ฟ๐ป๐ฒ๐ ๐ผ๐ณ ๐ง๐ต๐ถ๐ป๐ด๐ (๐๐ผ๐ง) ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- The Internet of Things (IoT) is a network of interconnected devices that can collect and share data. The IoT is a security challenge due to many potential entry points for cyber attackers. Security measures are needed at the device, network, and cloud levels to protect data and devices from unauthorized access.
๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- Protects a computer network from unauthorized access or damage. Network security includes measures like firewalls, intrusion detection, and encryption. Important when using computers to connect to the internet and/or storing sensitive data on networks.
Need help finding cyber security experts or jobs?