{"id":31,"date":"2024-08-16T12:10:59","date_gmt":"2024-08-16T06:40:59","guid":{"rendered":"https:\/\/jimssouthdelhi.com\/blogs\/?p=31"},"modified":"2024-08-16T14:30:37","modified_gmt":"2024-08-16T09:00:37","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/jimssouthdelhi.com\/blogs\/cybersecurity\/","title":{"rendered":"CYBERSECURITY"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22.3&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.22.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.22.5&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;]<p style=\"text-align: justify;\">The practice of protecting internet-connected systems such as hardware, software and data from cyber threats is called cybersecurity. To protect against unauthorized access to data centers and other computerized systems, cybersecurity is mainly used by individuals and enterprises. To access, alter, delete, destroy or extort an organization&#8217;s or user&#8217;s systems and sensitive data, a strong\u00a0<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/security-posture\">security posture<\/a> is designed which is provided\u00a0by an effective cybersecurity strategy\u00a0 against malicious attacks. It is also instrumental in preventing attacks designed to disable or disrupt the operations of systems or devices.<\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">An ideal cybersecurity approach should have multiple layers of protection across any access point or\u00a0<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/attack-surface\">attack surface<\/a>. For data, hardware, software and connected networks, a protective layer is included. Moreover, all employees within an organization who have access to any of these\u00a0<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/endpoint-device\">endpoints<\/a>\u00a0should be trained on the proper compliance and security processes. As an another layer of protection against threats some organizations also use tools such as unified threat management systems. These tools can detect, isolate and remediate potential threats and notify users if additional action is needed.<\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">The cybersecurity field is divided into several different sections. These sections are as follows:<\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\"><\/p>\n<li><a href=\"https:\/\/www.techtarget.com\/searchsoftwarequality\/definition\/application-security\">Application security<\/a><\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/information-security-infosec\">Information<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/Data-security-guide-Everything-you-need-to-know\">data security<\/a><\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li>Network security<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li>Disaster recovery and\u00a0<a href=\"https:\/\/www.techtarget.com\/searchdisasterrecovery\/definition\/business-continuity-action-plan\">business continuity planning<\/a><\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/OPSEC-operations-security\">Operational security<\/a><\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li>Cloud security<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">There are different <a href=\"https:\/\/www.jimssouthdelhi.com\/bca-course.php\">types of cyber threats<\/a>. Some of them are listed below:<\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\"><\/p>\n<li><strong>Computer worms and viruses<\/strong> are computer programs that can adversely affect the quality and performance of a computer, computer network or a computer resource. Computer viruses may also be responsible for data pilferage resulting in huge loss or damage to the affected person. It is very simple and easy to transfer virus and worms from one system to another system.<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware<\/strong>\u00a0is a kind of malware involving an attacker locking the victim&#8217;s computer system files via encryption and demanding a payment to decrypt and unlocking the victim\u2019s computer.<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li><strong>Social engineering<\/strong>\u00a0is an attack that relies on human interaction. It tricks users into breaking security procedures to gain sensitive information that&#8217;s typically protected.<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li><strong>Phishing\u00a0<\/strong>is a kind of cyber threat where fraudulent email or text messages are sent that resemble those from reputable or known sources. Generally random attacks, the intent of\u00a0<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/phishing\">phishing<\/a>\u00a0messages is to steal sensitive data, such as credit card or login information.<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li><strong>E-mail spoofing<\/strong> is a kind of cyber offence similar to the offence of identity theft with only minor differences.<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li><strong>Vishing <\/strong>is one of the cyber threats which is a combination of \u201cvoice\u201d and \u201cphishing\u201d. It is similar to a fraudulent act, but here the fraud occurs over automated or manual phone calls that guide the victim to gain financial reward; this results in \u00a0the victims providing the account number and password.<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<ul class=\"wp-block-list\" style=\"text-align: justify;\">\n<ul class=\"wp-block-list\">\n<li><strong>Man-in-the-middle attacks<\/strong>\u00a0are eavesdropping attacks that involve an attacker intercepting and relaying messages between two parties who they believe \u00a0are communicating with each other.<\/li>\n<\/ul>\n<\/ul>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">At <a href=\"https:\/\/www.jimssouthdelhi.com\/bca-placement.php\">JIMS Vasant Kunj II<\/a> BCA program offers papers focused on cybersecurity and also makes them easy to understand. Today many IT Companies are recruiting the employees based on this topic.<\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">Shivangi<\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">Assistant Professor, BCA Department<\/p>\n<p style=\"text-align: justify;\"><\/p>\n<p style=\"text-align: justify;\">JIMS, VK II<\/p>\n<p><\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22.3&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.22.3&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.22.5&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;] The practice of protecting internet-connected systems such as hardware, software and data from cyber threats is called cybersecurity. To protect against unauthorized access to data centers and other computerized systems, cybersecurity is mainly used by individuals and enterprises. To [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:paragraph -->\n<p>The practice of protecting internet-connected systems such as hardware, software and data from cyber threats is called cybersecurity. To protect against unauthorized access to data centers and other computerized systems, cybersecurity is mainly used by individuals and enterprises. To access, alter, delete, destroy or extort an organization's or user's systems and sensitive data, a strong&nbsp;<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/security-posture\">security posture<\/a> is designed which is provided&nbsp;by an effective cybersecurity strategy&nbsp; against malicious attacks. It is also instrumental in preventing attacks designed to disable or disrupt the operations of systems or devices.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>An ideal cybersecurity approach should have multiple layers of protection across any access point or&nbsp;<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/attack-surface\">attack surface<\/a>. For data, hardware, software and connected networks, a protective layer is included. Moreover, all employees within an organization who have access to any of these&nbsp;<a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/endpoint-device\">endpoints<\/a>&nbsp;should be trained on the proper compliance and security processes. As an another layer of protection against threats some organizations also use tools such as unified threat management systems. These tools can detect, isolate and remediate potential threats and notify users if additional action is needed.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The cybersecurity field is divided into several different sections. These sections are as follows:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li><a href=\"https:\/\/www.techtarget.com\/searchsoftwarequality\/definition\/application-security\">Application security<\/a><\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/information-security-infosec\">Information<\/a>\u00a0or\u00a0<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/Data-security-guide-Everything-you-need-to-know\">data security<\/a><\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Network security<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Disaster recovery and\u00a0<a href=\"https:\/\/www.techtarget.com\/searchdisasterrecovery\/definition\/business-continuity-action-plan\">business continuity planning<\/a><\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/OPSEC-operations-security\">Operational security<\/a><\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li>Cloud security<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>There are different <a href=\"https:\/\/www.jimssouthdelhi.com\/bca-course.php\">types of cyber threats<\/a>. Some of them are listed below:<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li><strong>Computer worms and viruses<\/strong> are computer programs that can adversely affect the quality and performance of a computer, computer network or a computer resource. Computer viruses may also be responsible for data pilferage resulting in huge loss or damage to the affected person. It is very simple and easy to transfer virus and worms from one system to another system.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>Ransomware<\/strong>\u00a0is a kind of malware involving an attacker locking the victim's computer system files via encryption and demanding a payment to decrypt and unlocking the victim\u2019s computer.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>Social engineering<\/strong>\u00a0is an attack that relies on human interaction. It tricks users into breaking security procedures to gain sensitive information that's typically protected.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>Phishing\u00a0<\/strong>is a kind of cyber threat where fraudulent email or text messages are sent that resemble those from reputable or known sources. Generally random attacks, the intent of\u00a0<a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/phishing\">phishing<\/a>\u00a0messages is to steal sensitive data, such as credit card or login information.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>E-mail spoofing<\/strong> is a kind of cyber offence similar to the offence of identity theft with only minor differences.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>Vishing <\/strong>is one of the cyber threats which is a combination of \u201cvoice\u201d and \u201cphishing\u201d. It is similar to a fraudulent act, but here the fraud occurs over automated or manual phone calls that guide the victim to gain financial reward; this results in \u00a0the victims providing the account number and password.<\/li>\n<!-- \/wp:list-item -->\n\n<!-- wp:list-item -->\n<li><strong>Man-in-the-middle attacks<\/strong>\u00a0are eavesdropping attacks that involve an attacker intercepting and relaying messages between two parties who they believe \u00a0are communicating with each other.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>At <a href=\"https:\/\/www.jimssouthdelhi.com\/bca-placement.php\">JIMS Vasant Kunj II<\/a> BCA program offers papers focused on cybersecurity and also makes them easy to understand. Today many IT Companies are recruiting the employees based on this topic.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Shivangi<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Assistant Professor, BCA Department <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>JIMS, VK II<\/p>\n<!-- \/wp:paragraph -->","footnotes":""},"categories":[1],"tags":[],"class_list":["post-31","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/posts\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":3,"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/posts\/31\/revisions"}],"predecessor-version":[{"id":56,"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/posts\/31\/revisions\/56"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/media\/18"}],"wp:attachment":[{"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/media?parent=31"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/categories?post=31"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jimssouthdelhi.com\/blogs\/wp-json\/wp\/v2\/tags?post=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}