Cyber Security: How it works

Jimmy Bongily
3 min readMar 25, 2021

So in today’s blog we will discuss how cyber security works in today’s technology. Cyber security is designed to apply multiple layers of protection to your computer, network, databases and programs. It works to prevent malicious programs from weakening your system and getting important information from you. We’ve talked about the different types of cyber security but now we will talk about how each one works in protecting your systems.

First we will start off with application security, application security is implementing different types of defenses for your business software's and services. Application security can work in different ways, my personal favorite is how they continuously search for ways to make your apps more secure. This is super important considering the fact that hackers are becoming more and more vigilant with their types of attacks so having programs that learn more each day is a great way to protect your apps. This type of security has different tools that analyze codes in case there are any mistakes or if there is anything hiding within certain codes. They can run application security at both the mobile and the computer level.

Second type of security we will talk about is data security. This type of security is making a database that ensures the information stored will be protected, this means it’ll protect the data being stored and the data that is being transferred to and from. This includes using encryption which masks the original format of the data and transforms it into a format unreadable by attackers, including protecting emails, codes, accounts, and web browsers.

Cloud security uses encryption, firewalls, pen testing, and VPN’s to ensure the users will not be hacked or any of their information getting leaked. This implies to office 365 users, people that use google docs or any of their other services. They use things such as two factor authentication heavily so that users can make sure they are the only ones accessing information intended only for themselves. Most people today find it more safe to store their data on the cloud then keep it on storage devices such as USB’s. Because of that it has led into the continuing development of cloud security.

Network security is configurations and rules set to protect your network, whether it be from inside threats or external threats. There are 3 different levels to network security, the first level being physical network security this prevents attackers from gaining physical access to your infrastructures like cabling, routers and so on. So they use things like controlled access and biometric authentication to ensure nothing is able to be compromised.

The second type is called technical security similar to that of data security or cloud security, it works in two ways the first is to protect the network from anything outside that could be damaging like someone sending denial of service attacks. The second level it works is by making sure employees aren’t doing any malicious activities or clicking on things that could invite those types of virus into the network. The final level is administrative security. This makes sure that only people with the right level of access are ensuring who’s on the network, who has control and how users on the network are authenticated.

All these layers of cyber security are crucial to the success of a business, the protection of your information and to ensure your apps and browsers are working at the best of their abilities. It is amazing to see the development of cyber security working in ways that in the beginning no one would imagine and I’m excited to see more of this in the future.

References:

https://www.csoonline.com/article/3315700/what-is-application-security-a-process-and-tools-for-securing-software.html#:~:text=Application%20security%20is%20the%20process,apps%20once%20they%20are%20deployed.

https://nexthop.ca/it-news/what-is-cybersecurity-and-how-does-it-work/#:~:text=Cybersecurity%20is%20the%20process%20of,to%20extort%20money%20from%20users.

https://www.microfocus.com/en-us/what-is/data-security

https://www.investopedia.com/terms/c/cloud-security.asp#:~:text=What%20Is%20Cloud%20Security%3F,and%20avoiding%20public%20internet%20connections.

--

--