What Are the Types of Cyber Security?
๐๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- Protects the data and functionality of an application from unauthorized access or malicious attacks. Includes input validation, output encoding, and authentication/authorization controls.
๐๐น๐ผ๐๐ฑ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- Secures data and information that is stored on or accessed through a cloud computing service. Data in the cloud must be protected at the application, network, and physical level.
๐๐ฟ๐ถ๐๐ถ๐ฐ๐ฎ๐น ๐๐ป๐ณ๐ฟ๐ฎ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- Protects the nationโs vital infrastructure, such as energy, transportation, and communication systems, from cyber attacks. Includes identification and assessment of risk, prevention and mitigation measures, and response and recovery plans.
๐๐ป๐๐ฒ๐ฟ๐ป๐ฒ๐ ๐ผ๐ณ ๐ง๐ต๐ถ๐ป๐ด๐ (๐๐ผ๐ง) ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- The Internet of Things (IoT) is a network of interconnected devices that can collect and share data. The IoT presents a unique security challenge with many potential entry points for cyber attacks. Security measures must be taken at the device, network, and cloud levels to protect data and devices from unauthorized access.
๐ก๐ฒ๐๐๐ผ๐ฟ๐ธ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐- Protects a computer network from unauthorized access or damage. Network security includes measures like firewalls, intrusion detection, and encryption. Important for those who use computers to connect to the internet and/or who store sensitive data on their networks.
Hiring for cybersecurity?