Every organization has some assets that are made up of a variety of different systems. These systems must have a strong Cyber Security aspect to make the organization work well. According to the devices used in Cyber Security, it can be divided into the following types:
Network security:
Network security is one of the most important types of Cyber security. In this process, we have to secure a computer network against unauthorized access, intruders, attacks, disruption, and misuse using hardware and software. This security also adds an extra layer in protecting an organization's assets from both external and internal threats. An example of Network security is using a Firewall.
Application security:
Application security is used to safeguard software and devices against malicious attacks. This can be achieved by regularly updating the apps to ensure that they are secure against threats.
Identity management & security:
Identity management & security identifies each individual's level of access inside an organization. For example, you can restrict and allow access to data according to an individual's job role in the company.
Data security:
Data security is used to ensure that you put your data in a strong data storage system to ensure data integrity and privacy while in storage and transport.
Operational security:
Operational security is used to analyze and make decisions about handling and securing the data assets. For example: Storing data in an encrypted form in the database is an example of Operational security.
Mobile security:
Mobile security is used to specify the protection of organizational and personal data held on mobile devices such as cell phones, PCs, tablets, and other similar devices against various hostile attacks. Examples of mobile security threats are unauthorized access, device loss or theft, malware, and other threats that can harm mobile devices.
Cloud security:
The main aim of cloud security is to safeguard the data held in a digital environment or cloud infrastructures for an organization. It uses various cloud service providers, including AWS, Azure, Google, and others, to assure protection against a variety of threats.