<br />
<b>Warning</b>:  Undefined array key "global_protection_id" in <b>/home/wikitechy/public_html/interview-questions/wp-content/plugins/content-protector/inc/class-ps-rest-handler.php</b> on line <b>51</b><br />
{"id":776,"date":"2021-07-17T19:32:15","date_gmt":"2021-07-17T19:32:15","guid":{"rendered":"https:\/\/www.wikitechy.com\/interview-questions\/?p=776"},"modified":"2021-09-11T06:59:09","modified_gmt":"2021-09-11T06:59:09","slug":"what-is-cyber-security","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/","title":{"rendered":"What is Cyber Security ?"},"content":{"rendered":"<div class=\"TextHeading\">\n<div class=\"hddn\">\n<h2 id=\"what-is-cyber-security\" class=\"color-pink\" style=\"text-align: justify;\">What is Cyber Security ?<\/h2>\n<ul style=\"text-align: justify;\">\n<li>Cyber security or information technology security refers to a set of techniques used to protect the integrity of\u00a0<a href=\"https:\/\/www.wikitechy.com\/tutorials\/java\/java-networking\" target=\"_blank\" rel=\"noopener\">networks<\/a>, programs and data from attack, damage or unauthorized access that are aimed for exploitation.<\/li>\n<li>In a computing context, security comprises cybersecurity and physical security both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.<\/li>\n<li>Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity. <a href=\"https:\/\/texaport.co.uk\/it-support-aberdeen\/\">texaport.co.uk<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"text-center row\" style=\"text-align: justify;\"><\/div>\n<h2 id=\"elements-of-cybersecurity\" class=\"color-purple\" style=\"text-align: justify;\">Elements of cybersecurity<\/h2>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li>Ensuring cybersecurity requires the coordination of efforts throughout an information system, which includes:\n<ul>\n<li><a href=\"https:\/\/www.wikitechy.com\/technology\/protect-wi-fi-network-hackers\/\" target=\"_blank\" rel=\"noopener\">Network security<\/a><\/li>\n<li><a href=\"https:\/\/forums.wikitechy.com\/answer\/re-how-would-you-ensure-security-over-web-in-your-application\/\" target=\"_blank\" rel=\"noopener\">Application security<\/a><\/li>\n<li>Endpoint security<\/li>\n<li><a href=\"https:\/\/www.wikitechy.com\/interview-questions\/power-bi\/what-is-the-level-of-data-security-provided-by-power-bi\/\" target=\"_blank\" rel=\"noopener\">Data security<\/a><\/li>\n<li>Identity management<\/li>\n<li>Database and infrastructure security<\/li>\n<li><a href=\"https:\/\/www.wikitechy.com\/cloud-computing\/cloud-infrastructure-as-a-service\/\" target=\"_blank\" rel=\"noopener\">Cloud\u00a0<\/a>security<\/li>\n<li>Mobile security<\/li>\n<li>Disaster recovery\/business continuity planning<\/li>\n<li>End-user education<\/li>\n<\/ul>\n<\/li>\n<li>The most difficult challenge in cyber security is the ever-evolving nature of security risks themselves.<\/li>\n<li>The traditional approach has been to focus resources on crucial system components and protect against the biggest known threats, which meant leaving components undefended and not protecting systems against less dangerous risks.<\/li>\n<li>Today, this approach is insufficient, as the threats advance and change more quickly than organizations can keep up with. As a result, advisory organizations promote more proactive and adaptive approaches to cyber security.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"ImageContent\" style=\"text-align: justify;\">\n<div class=\"hddn\"><img decoding=\"async\" class=\"img-responsive center-block aligncenter\" src=\"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png\" alt=\"Information Risk Management\" \/><\/div>\n<\/div>\n<div class=\"TextHeading\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<h2 id=\"cyberthreats\" class=\"color-purple\">Cyberthreats<\/h2>\n<\/div>\n<\/div>\n<p style=\"text-align: justify;\">The core functionality of cybersecurity involves protecting information and systems from major cyberthreats. These cyberthreats take many forms :<\/p>\n<div class=\"Content\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<ul>\n<li><b>Ransomware<\/b>\u00a0is a type of malware that involves an attacker locking the victim&#8217;s computer system files &#8212; typically through encryption &#8212; and demanding a payment to decrypt and unlock them.<\/li>\n<li><b>Malware<\/b>\u00a0is any file or program used to harm a computer user, such as worms, computer viruses, Trojan horses and spyware.<\/li>\n<li><b>Social engineering\u00a0<\/b>is an attack that relies on human interaction to trick users into breaking security procedures in order to gain sensitive information that is typically protected.<\/li>\n<li><b>Phishing<\/b>\u00a0is a form of fraud where fraudulent emails are sent that resemble emails from reputable sources; however, the intention of these emails is to steal sensitive data, such as credit card or login information.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"TextHeading\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<h2 id=\"cyberterrorism\" class=\"color-purple\">Cyberterrorism<\/h2>\n<ul>\n<li>cyberterrorism is the disruptive use of information technology by terrorist groups to further their ideological or political agenda.<\/li>\n<li>It takes the form of attacks on networks, computer systems and telecommunication infrastructures.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"TextHeading\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<h2 id=\"cyberwarfare\" class=\"color-purple\">Cyberwarfare<\/h2>\n<ul>\n<li>Cyberwarfare involves nation-states using information technology to penetrate another nation\u2019s networks to cause damage or disruption.<\/li>\n<li>In the U.S. and many other nations, cyberwarfare has been acknowledged as the fifth domain of warfare (following land, sea, air and space).<\/li>\n<li>Cyberwarfare attacks are primarily executed by hackers who are well-trained in exploiting the intricacies of computer networks, and operate under the auspices and support of nation-states.<\/li>\n<li>Rather than \u201cshutting down\u201d a target\u2019s key networks, a cyberwarfare attack may intrude into networks to compromise valuable data, degrade communications, impair such infrastructural services as transportation and medical services, or interrupt commerce.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"TextHeading\" style=\"text-align: justify;\">\n<div class=\"hddn\">\n<h2 id=\"cyberespionage\" class=\"color-purple\">Cyberespionage<\/h2>\n<\/div>\n<\/div>\n<ul>\n<li style=\"text-align: justify;\">Cyberespionage is the practice of using information technology to obtain secret information without permission from its owners or holders.<\/li>\n<li style=\"text-align: justify;\">Cyberespionage is most often used to gain strategic, economic, political or military advantage, and is conducted using cracking techniques and malware.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Answer : Cyber security or information technology security refers to a set of techniques&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"passster_activate_protection":false,"passster_protect_child_pages":"","passster_protection_type":"password","passster_password":"","passster_activate_overwrite_defaults":"","passster_headline":"","passster_instruction":"","passster_placeholder":"","passster_button":"","passster_id":"","passster_activate_misc_settings":"","passster_redirect_url":"","passster_hide":"no","passster_area_shortcode":"","gtb_hide_title":false,"gtb_wrap_title":false,"gtb_class_title":"","gtb_remove_headerfooter":false,"footnotes":""},"categories":[4590],"tags":[195,201,4609,360,221,203,199,363,15908,4976,4606,4989,4992,4988,4995,4993,4979,5001,4981,4975,4971,4974,4972,4998,4997,4990,4996,5000,205,222,4999,362,196,212,4978,213,4977,4980,4985,710,207,4605,366,4991,204,217,288,367,483,206,4608,200,4973,4984,4983,4987,4986,197,4607,4994,4982,4970],"class_list":["post-776","post","type-post","status-publish","format-standard","hentry","category-networking","tag-accenture-interview-questions-and-answers","tag-allstate-solutions-pvt-ltd-interview-questions-and-answers","tag-applied-mate-interview-questions-and-answers","tag-atos-interview-questions-and-answers","tag-bharti-airtel-interview-questions-and-answers","tag-capgemini-interview-questions-and-answers","tag-casting-networks-india-pvt-limited-interview-questions-and-answers","tag-ciena-corporation-interview-questions-and-answers","tag-comodo-india-interview-questions-and-answers","tag-computer-security","tag-css-corp-pvt-ltd-interview-questions-and-answers","tag-cyber","tag-cyber-attack","tag-cyber-crime","tag-cyber-defense","tag-cyber-safety","tag-cyber-security","tag-cyber-security-attacks","tag-cyber-security-concepts","tag-cyber-security-definition","tag-cyber-security-definitions","tag-cyber-security-examples","tag-cyber-security-information","tag-cyber-security-risks","tag-cyber-security-threats","tag-cyber-threats","tag-cybersecurity-definition","tag-define-cyber","tag-dell-international-services-india-pvt-ltd-interview-questions-and-answers","tag-flipkart-interview-questions-and-answers","tag-future-of-cybersecurity","tag-hcl-technologies-interview-questions-and-answers","tag-ibm-interview-questions-and-answers","tag-indecomm-global-services-interview-questions-and-answers","tag-information-and-cyber-security","tag-infosys-technologies-interview-questions-and-answers","tag-introduction-cyber-security","tag-introduction-to-cyber-security","tag-list-of-types-of-cyber-attacks","tag-mavenir-interview-questions-and-answers","tag-mphasis-interview-questions-and-answers","tag-ncr-corporation-interview-questions-and-answers","tag-netapp-interview-questions-and-answers","tag-network-security","tag-oracle-corporation-interview-questions-and-answers","tag-peoplestrong-interview-questions-and-answers","tag-r-systems-interview-questions-and-answers","tag-rbs-india-development-centre-pvt-ltd-interview-questions-and-answers","tag-reliance-industries-ltd-interview-questions-and-answers","tag-sap-labs-india-pvt-ltd-interview-questions-and-answers","tag-tata-communications-interview-questions-and-answers","tag-tech-mahindra-interview-questions-and-answers","tag-types-of-cyber-security","tag-types-of-cyber-security-attacks","tag-types-of-cyber-security-threats","tag-types-of-cyber-warfare","tag-types-of-security-attacks","tag-unitedhealth-group-interview-questions-and-answers","tag-virtela-interview-questions-and-answers","tag-what-is-cyber-crime","tag-what-is-cyber-security","tag-what-is-cyber-security-all-about"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cyber Security ? - Networking Interview Questions - Wikitechy<\/title>\n<meta name=\"description\" content=\"What is Cyber Security ? - Cyber security or information technology security refers to a set of techniques used to protect the integrity of networks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cyber Security ? - Networking Interview Questions - Wikitechy\" \/>\n<meta property=\"og:description\" content=\"What is Cyber Security ? - Cyber security or information technology security refers to a set of techniques used to protect the integrity of networks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Wikitechy\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-17T19:32:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-11T06:59:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/\",\"name\":\"What is Cyber Security ? - Networking Interview Questions - Wikitechy\",\"isPartOf\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png\",\"datePublished\":\"2021-07-17T19:32:15+00:00\",\"dateModified\":\"2021-09-11T06:59:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757\"},\"description\":\"What is Cyber Security ? - Cyber security or information technology security refers to a set of techniques used to protect the integrity of networks\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/#primaryimage\",\"url\":\"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png\",\"contentUrl\":\"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/\",\"name\":\"Wikitechy\",\"description\":\"Interview Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cyber Security ? - Networking Interview Questions - Wikitechy","description":"What is Cyber Security ? - Cyber security or information technology security refers to a set of techniques used to protect the integrity of networks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"What is Cyber Security ? - Networking Interview Questions - Wikitechy","og_description":"What is Cyber Security ? - Cyber security or information technology security refers to a set of techniques used to protect the integrity of networks","og_url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/","og_site_name":"Wikitechy","article_published_time":"2021-07-17T19:32:15+00:00","article_modified_time":"2021-09-11T06:59:09+00:00","og_image":[{"url":"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/","url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/","name":"What is Cyber Security ? - Networking Interview Questions - Wikitechy","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png","datePublished":"2021-07-17T19:32:15+00:00","dateModified":"2021-09-11T06:59:09+00:00","author":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757"},"description":"What is Cyber Security ? - Cyber security or information technology security refers to a set of techniques used to protect the integrity of networks","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-cyber-security\/#primaryimage","url":"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png","contentUrl":"https:\/\/cdn.wikitechy.com\/interview-questions\/networking\/information-risk-management.png"},{"@type":"WebSite","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website","url":"https:\/\/www.wikitechy.com\/interview-questions\/","name":"Wikitechy","description":"Interview Questions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/4d5a581fb5470d1560324bddc5e8b757","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9531079fe7e07841b7b156c04d65e5f39d4adfd18b6ffe3edfff8ca5aab85b5?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.wikitechy.com\/interview-questions\/author\/editor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/comments?post=776"}],"version-history":[{"count":5,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/776\/revisions"}],"predecessor-version":[{"id":3317,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/776\/revisions\/3317"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/media?parent=776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/categories?post=776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/tags?post=776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}