Cyber Security & vulnerabilities and Cyber Security Safeguards

 

Cyber Security & vulnerabilities and Cyber Security Safeguards

Overview:

Are weakness of a system that Given threat the opportunity to compromise assets

All System have Vulnerabilities even through the technologies are improving but the number of vulnerabilities are increasing Sach a ten of millions of item of code many Developer human weakness etc.

Vulnerabilities mostly happened because of hardware & S\w  network and procedural vulnerabilities

Hardware vulnerabilities : is a weakness which can use to attack the system h/w through physically & remotely

Old version of  System & devices unprotected storage unincited devices Etc.




Software  vulnerabilities 

s/w  error happened in development or configurated such as the execution of it can violate the Security policies 

look of input valuation

unverified upload

cross side scripting

unencrypted data etc.

 

 network  vulnerabilities

the weakness happened in the organization operational methods

 

unprotected communication

malware medusoids s/w

social engineering attacks

misconfigured firewall

 

 procedural  vulnerabilities the weakness happened in an organization methods

password procedure: should follow the standard password policy

vulnerabilities in a s/w system administration:

is a responsible for managing & maintaining an organization it infrastructure ensuring that h/w ran smoothly securely & efficiently

the key responsible typically include:

System installation & configuration:

·      Salting up os application & software tool

 

User management:

·      Create up ceding & managing user Account permission & rule

Security Administration:

·      Implementing Security  measure managing firewall and marketing  for travel

 

Performance mentoring & optimization:

·      Ensuring system run efficiently &  troubleshooting issues

Backup recovery :

·     Seating up data backup and disaster recovery plans

 

Complex network Architecture

Declare and maintaining network is challenging process that requires integrating various technologies such as : h/w and electrical System

Layered :   is a design framework used in networking to organize & simplify the complex communication system

It divide the networking process into different layer assign specific set of task and responsibilities

 The Structure approach ensure modularity flexibilities and easer

The most commonly used Architecture are OSI model

TCP/IP

Open System interconnection model is a theoretical framework developed by ISO for understanding & implementing network protocol consist of 7 layer 

§  Physical layer

§  Data link layer

§  Network layer

§  Transport layer

§  Sebastian layer

§  Presentation layer

§  Application layer

 

TCP/IP:

Is a foundational framework for Moden  networking providing a  techitecture  the underpin the internet  most communication System

How data is transmitted routed &  recovered accrossimplemented methods’

·     Application layer

·     Transport layer

·     Internet layer

·     Network access layer

 

Open access organization Data

Refer to the protective making data and another material easily accessible for both internal & external participation

Open data and data collaboration allow organization to share and access data that then able them economical environmental benefit open organization week make their data and other material easily accessible to both internal & external participants

Weak Authentication:

Means cryptographic authentication b/w previous unknown parties without relying on trusted   third parties

Toolbox:

Special Separation:

Ensure pear to reliable via specific communication path

Physical contact /network /path/ quality of a   path

Terminal separation

Ensure pear is still the same peer session /inner- session

Asymmetric cast wars:

Cryptographic semantics of identifiers

Weak authentication refer to security measure that are insufficiently measure that are insufficicantly robots to efficiently    verify the identify of user of a system

This leads to understands access and potential security breahare near some key point above weak authentication

 

 

 

 

 

 

 

 

 

Cyber Security Safeguards

A safeguards is cyber security  refer to combination of measure implemented secure system and data from attacks  and  unfaith raised access this measure are design to specify specification  such as confidentiality in integrity and availability of a system

Safeguards is important at all level of system to system to insure  max position against all possible type of cyber threat

Access control manage :

This is define mechanism that restrict access to a system info. By unauthorized user at inside authorization  and accounting that help to insure only authorized user have access to data and system

Firewalls are the network security devices that monitor control network traffic & help the block authorized access  it one of the most efficiencies safeguards in cyber Security

Vulnerabilities Scanner:

Are tool design to detect any vulnerabilities or weakness in a system that can be exploited by attacker these tool help  fix the vulnerabilities to ensure the system can withstands attacks

Security policies & procedures:

Are guidelines are rule that are established to mitigate cyber threat that publicizes inside password policies patch management incident response procedures and data backup and recovery policies  

 

Safeguarding a system required a integration  of multiple security measure to aware protection max. awareness against Cyber threat

Access Control: is a security technologies

That regular  who can view user or access creation measure with in an organization  

The Security process  ensure that sensitive area and system are only available to authorized user 

Physical access control:

Manage enter of physical location using tool like took biometric device or keywords

Layer access control manage concentration to digital system including data access application network

Access control security combines these to aspect creating a robust framework for protecting assets

Access control impact for security :

To minimize risk and ensure compline its protective nature provide multiple benefits

Managing  risk :  prevent unauthorized access to sensitive area and system

Enhancing data security :  protect critical info. For benefits

Ensuring compliance: align with religion lake GOPR And PCIDSS

 

 Authentication

It is process of that combine use to conform that only the right people services and app with a right permissions get organizational resources it is a important part of cyber security because  of bad actor  number one policy to gain  unauthorized access to system they do this by stealing the username & passwords of user that do not access the authorization  process  induce 3 primary steps

Identification user establish who they are specially through username

Authorization typically user  prier they are who  are by entering password sometime only user they supported who know

Organization also  required that they  identify with something they have or something they are

The system verify that the user have permission to the system they are attempting to access

 

 

BIOMETRICS:

Is a measure of biological or behavioral feature within or use for identification of individual most of these feature and cannot be grossed and stolen

Biometric System:

It is  a system that that is individual physical behavioral or both traits as individual analysis and identifies the individual as legate  or user  

 

  

 

Comments

Popular posts from this blog

Artificial Intelligence

python

DIGITAL COMMUNICATION & NETWORK