Skip to main content

What Is Cyber Security ?

 

 In Simple words, Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.  



 Now the main question is that what are the requirements and skills we should have for cyber security.............

 

1. Problem-Solving Skills

As a cybersecurity professional, problem-solving will play a major role in your day-to-day work. Those in the field need to find creative ways to take on and address complex information security challenges across a variety of existing and emerging technologies and digital environments.

  

2. Technical Aptitude

As the name implies, cybersecurity is a technology-focused field: you will be likely be tasked with responsibilities such as troubleshooting, maintaining, and updating information security systems; implementing continuous network monitoring; and providing real-time security solutions. Being technologically savvy is essential in order to perform the daily activities of a cybersecurity professional.

 

 3. Knowledge of Security Across Various Platforms

Cybersecurity isn't just limited to computers: you'll need to be comfortable working on a variety of operating systems, computer systems, mobile devices, cloud networks, and wireless networks - and keep up to date on advances in the field for all of them.

 

4. Attention to Detail

Being able to defend an organization against cyber breaches requires you to be highly vigilant and detail-oriented, in order to effectively detect vulnerabilities and risks. You'll like be responsible for continuous network monitoring and will need to be able to quickly identify concerns and come up with real-time security solutions to address them.

 

5. Communication Skills

As a cybersecurity specialist, you'll be working closely with individuals in other roles and departments, and it's important to be able to effectively communicate and explain your findings, concerns, and solutions to others. It's important to be able to speak clearly and concisely on cybersecurity strategy and policy, as well as to be able to convey technical information to individuals of different levels of technical comprehension.

 

 

6. Fundamental Computer Forensics Skills

While computer forensics and cybersecurity  are two separate fields, they're closely related - and having a foundation in computer forensics can help you excel in your cybersecurity career. To be able to effectively protect organizations' digital assets and prevent security breaches, you'll need to have a solid understanding of what happens if your efforts fail, and how compromised data is recovered. Most cybersecurity degree programs will have a computer forensics component for this reason.

 

 7. A Desire to Learn

As with any technical field, cybersecurity is fast-changing. Anyone who works in the field will need to be committed to keeping current with best practices and emerging industry trends, and will always need to be learning and self-educating - both on and off the clock.

 

8. An Understanding of Hacking

To effectively protect an organization's network and infrastructure, you'll need to know how they can be exploited in the first place - that's why most cybersecurity professionals must learn how to "ethically hack." Essentially, you need to have the same skills as a hacker, to fully understand how a system could be breached, and in turn, create effective solutions for thwarting these attacks.

 


 

 But as we go further in the industry, you will find that their are various types of roles that you can choose in Information and Security(Cyber Security) some of them are:

  • Security Analyst
  • Security Engineer.
  • Security Architect.
  • Security Administrator.
  • Security Software Developer.
  • Cryptographer.
  • Crypt analyst.
  • Security Consultant




In further post you all will get how to start in cyber security and more interesting post on ethical hacking and offensive testing.   ......................................stay tuned :)


Comments

Popular posts from this blog

Configuring ModSecurity Web Application Firewall

ModSec is an open-source web application firewall which was designed for the apache server initially but now can be used for other different servers as well.ModSecurity is also known as ModSec and can filter HTTP requests and responses based on defined filtering rules. We will use the OWASP ModSecurity CORE RULE SET (CRS) here. We can also define our custom rules but that is a different topic.  Here is an illustration of how to configure a ModSec firewall using apache2. I have just created a simple PHP page that will be used to verify credentials. Put this page in /var/www/html/login.php Here is the page login.php: <html> <body> <?php if(isset($_POST[‘login’])) { $username = $_POST[‘username’]; $password = $_POST[‘password’]; $connection = mysqli_connect(‘localhost’,’root’,’test’,’testdb’); $result = mysqli_query($connection, “SELECT * FROM `users` WHERE username=’$username’ AND password=’$password’”); if(mysqli_num_rows($result) == 0) echo ‘Wrong Credentia

What Is Cryptography ?

  Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix "crypt-" means "hidden" or "vault" -- and the suffix "-graphy" stands for "writing."   Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication. Modern cryptography concerns itself with the following four objectives:   •  Confidentiality : the information cannot be understood by anyone for whom it was unintended •  Integrity : the information cannot be altered in storage or transit between sender and intended receiver without the alterati

How Internet Works ?

what is a protocol? A protocol is a set of rules specifying how computers should communicate with each other over a network. For example, the Transport Control Protocol has a rule that if one computer sends data to another computer, the destination computer should let the source computer know if any data was missing so the source computer can re-send it. Or the Internet Protocol which specifies how computers should route information to other computers by attaching addresses onto the data it sends.   What’s a packet? Data sent across the Internet is called a message. Before a message is sent, it is first split in many fragments called packets. These packets are sent independently of each other. The typical maximum packet size is between 1000 and 3000 characters. The Internet Protocol specifies how messages should be packetized.   What’s a packet routing network? It is a network that routes packets from a source computer to a destination computer. The Internet is made up of a massive ne