Saad Haroon
7 min readJan 26, 2023


Be aware of Cybersecurity
  1. What is Cybersecurity?

Cyber security is the practice of protecting networks, systems, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cyber security is important because it helps protect organizations, individuals, and government agencies from malicious digital attacks. It also helps to ensure the safety of critical data and systems. Cyber security involves a variety of measures taken to protect networks and systems from unauthorized access, data manipulation, and malicious software. These measures include the use of firewalls, antivirus software, encryption, and user authentication.


(a) Network Security:-

This type of security focuses on protecting networks, their services, and the data that passes through them. This includes the use of firewalls, antivirus software, intrusion prevention systems (IPS), and Virtual Private Networks (VPNs).

One example of network security in cyber security is using a firewall to prevent unauthorized access to a network. A firewall is a system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules and policies. It can be hardware-based, software-based, or a combination of both. The firewall can be configured to block specific IP addresses, ports, or types of data to prevent malicious traffic from entering the network while allowing legitimate traffic to pass through. This helps to protect the network and the devices connected to it from cyber-attacks such as hacking, malware, and ransomware.

(b) Application Security:-

This type of security focuses on protecting applications and the data they generate. This includes the use of secure coding practices, secure web application frameworks, and web application firewalls (WAFs).

One example of application security in cyber security is input validation. This involves checking user input, such as form submissions or query parameters, to ensure that it meets certain criteria before it is processed by the application. This can help prevent attacks such as SQL injection, where malicious users attempt to inject malicious code into an application’s database. By validating user input, the application can ensure that only safe and expected data is used, reducing the risk of a successful attack.

(c) Data Security:-

This type of security focuses on protecting data from unauthorized access, modification, or destruction. This includes the use of encryption, data loss prevention (DLP) systems, and access control measures.

For example, a company might use encryption to protect customer credit card information during online transactions. The encrypted information can only be decrypted and read by the company’s servers, ensuring that the sensitive information remains secure. Another example is the use of firewalls and intrusion detection/prevention systems to keep unauthorized users from accessing a network.

(d) Endpoint Security:-

This type of security focuses on protecting the devices that are connected to a network. This includes the use of antivirus and anti-malware software and disk-level encryption.

Endpoint security refers to the protection of devices that connect to a network, such as computers, smartphones, and tablets.

An example of endpoint security in practice would be a company implementing a policy that requires all employees to install anti-virus software on their laptops and regularly update it to prevent malware infections. Additionally, the company may also use endpoint security software that monitors network traffic and alerts IT staff to any suspicious activity. This software can also block or quarantine any malicious files that are detected.

(e) Identity and Access Management (IAM):-

This type of security focuses on protecting user identities and managing access to resources. This includes the use of single sign-on (SSO) solutions, multi-factor authentication (MFA), and identity and access governance systems.

A company wants to ensure that only authorized employees have access to sensitive data stored on its servers. To achieve this, the company implements an IAM system that includes the following steps:-

(i) Employee registration: Employees are required to register their personal information, such as name, email, and role within the company, in the IAM system.

(ii) Authentication: Employees are prompted to enter their username and password to access the company’s resources. The IAM system verifies their identity by checking the information against the employee registration data.

(iii) Authorization: Based on the employee’s role and level of clearance, the IAM system grants or denies access to specific resources. For example, a junior employee might only have access to non-sensitive data, while a senior employee would have access to sensitive data.

(iv) Audit: The IAM system records all access attempts, including successful and failed attempts, and generates reports for auditing and compliance purposes.

(v) Revocation: In case of an employee leaves the company, their access to company resources will be revoked by the IAM system to ensure the security of the data.

By implementing an IAM system, the company can ensure that only authorized employees have access to sensitive data and that access attempts are tracked and audited for compliance and security purposes.


Cloud security is a set of control-based technologies and policies designed to protect cloud-based systems, data, and infrastructure from cyber threats. These control-based technologies and policies are designed to protect cloud-based systems from malicious actors, data breaches, and other cyber threats. These controls can include:-

• Encryption of data in transit and at rest

• Firewalls and intrusion prevention systems

• Cloud Access Security Brokers

• Identity and access management

• Security logging and monitoring

• Data Loss Prevention (DLP) tools

• Vulnerability scanning and patching

• Multi-factor authentication

• Application whitelisting

• Container security

• Network segmentation

• Web Application Firewalls (WAFs)


(a) Phishing scams:-

This type of scam involves a fraudster sending an email or message pretending to be a legitimate organization, such as a bank or popular e-commerce website, in order to trick the recipient into providing sensitive information such as login credentials or credit card details.

(b) Ransomware:-

This type of scam involves a hacker gaining unauthorized access to a victim’s computer or network and encrypting their files, effectively holding them hostage until a ransom is paid.

(c) Investment scams:-

These types of scams involve fraudsters convincing individuals to invest in fake or non-existent opportunities, such as a new cryptocurrency or a “sure-thing” stock.

(d) Tech support scams:-

These scams typically involve a fraudster calling or messaging a victim, pretending to be from a reputable technical support organization, and convincing them to give remote access to their computer or to pay for unnecessary technical services.

(e) Advance fee scams:-

These scams involve fraudsters asking victims to pay an advance fee for a product or service, such as a loan or prize, that never materializes.


(a) Develop a Risk Management Plan:-

Identify potential risks and vulnerabilities, and develop a plan to address them. This plan should include a strategy to assess, monitor, and mitigate risk.

(b) Develop a Security Strategy:-

Develop a comprehensive security strategy to protect the organization’s assets. This strategy should include the implementation of security measures such as firewalls, antivirus software, network segmentation, encryption, and user authentication.

(c) Implement Policies and Procedures:-

Develop policies and procedures for implementing and maintaining security measures, as well as for responding to security incidents.

(d) Train Employees:-

Educate employees on security best practices, such as password security and data handling.

(e) Monitor Network Activity:-

Monitor and detect unusual activity, and respond promptly to any potential threats.

(f) Perform Vulnerability Assessments:-

Regularly assess the organization’s networks and systems for vulnerabilities, and take an action to remediate them.

(g) Implement Security Controls:-

Implement appropriate security controls such as encryption, access control, and authentication.

(h) Backup Data:-

Regularly back up data to ensure its availability in the event of a disaster.


(a) Improved Data Security:-

Cyber security can help protect the sensitive data of an organization from malicious threats, cyber-attacks, and data breaches. It helps ensure that only authorized personnel have access to confidential data.

(b) Reduced Cost of Security:-

With cyber security measures in place, organizations can reduce the costs associated with data breaches and other malicious cyber-attacks.

(c ) Improved Compliance:-

Cybersecurity systems help organizations comply with industry-specific regulations, such as HIPAA, PCI, and GDPR.

(d) Enhanced User Experience:-

Cybersecurity measures can improve the user experience by protecting customers and users from malicious threats.

(e) Increased Productivity:-

By minimizing the risk of data breaches, cyber security helps organizations increase their productivity.

(f) Improved Brand Reputation:-

Cyber security systems can help organizations protect their brand reputation by preventing data breaches and other malicious attacks.


Cyber security is an ever-evolving field that requires constant vigilance and attention. It is important to ensure that your systems and data are secure and that you are aware of the latest cybersecurity threats and how to protect yourself against them. Cybersecurity professionals should stay up-to-date on the latest developments in the field in order to remain ahead of the threats. Additionally, it is important to remember that cyber security is not just a technical issue, but a cultural one as well. All employees should be trained on how to practice safe cyber security habits, and organizations should have comprehensive policies in place to ensure that they are in compliance with all relevant laws and regulations.

Saad Haroon

I'm professional content writer. My expertise lies in well-researched, SEO-friendly, and engaging content for websites, blogs, and other online platforms.