UNIT2


UNIT 2-QUESTION 1
#QTSRound3

Cybersecurity and information security are not intrinsically different, but they are related in much the same way that the broader field of “science” is related to the practice of chemistry.
Cybersecurity is a broad application, requiring the most competent practitioners the proficiency of a number of special skills in the theory and practice of computation. In the area of “information security,” for example, cybersecurity ensures that servers, intranets, and channels built for data transmission remain protected and are only accessible to those servers, intranet and allowed channels. While some cybersecurity professionals may specialize in the field of information security, this is just one of many aspects of the field of cybersecurity.
Network security is another division in network security that focuses on data leaving or entering a device through an established network of computers and servers. Experts in network security monitor the multitude of interactions between networked computers and other machines to ensure their connection is protected.

But information is not the only sensitive point. Some hackers are more interested in uncovering passwords and accessing closed networks so they can manipulate data and websites or turn off essential functions. This requires a complete focus on keeping track of all the vulnerable points so that the prying eyes of hackers and cyber-terrorists cannot get close to every interaction between a personal computer or a device. mobile device to the network or server.
Information security can be simply defined as “the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability.” Any data storage and transfer point is considered an “information system”, which means that the application can be applied in a variety of environments, including external environments, cyberspace.
This is also the broader goal of cybersecurity, and precisely the need to be able to make experts in the field even more in demand in the next 10 years.
END

 

+ There are no comments

Add yours