This is an era where everyone is depended on the Internet. We are bounded in the zone where we have to say that “Internet is the prime factor of today’s world”. From the chat box to mail box, or from online shopping to banking everything is done under the platform of Internet from a personal computer, laptop, mobile or a cyber cafe. So based on the internet some evil-minded people take the responsibility to do some unsocial work or cyber attacks to earn money or to capture the personal data illegally. So here in such vital circumstances, here comes the term ‘Cyber Security’ in action.

What is Cyber Security?

Cyber security is nothing but the protection of internet-connected systems, which includes hardware, software and data, from the illegal cyber attacks. In context of computing, security comprises cyber security and physical security – both are used by enterprises to provide protection to unauthorized access to data and other computerized systems. The subset of cyber security is Information security which is designed to maintain the confidentiality, integrity and availability of data. Cyber security requires coordination of efforts throughout an information system. This includes :

·Application security

·Information security

·Operational security

·Network security

·Mobile security

·Identity management

·Disaster recovery

·End-user education.

The most difficult challenge in cyber security is the ever-evolving nature of security risks themselves.

A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber attacks include threats like computer viruses, data breaches, and Denial of Service (DoS) attacks. Some threats of cyber security is outlined below:

·Malware
·Phishing
·Spear Phishing
·“Man in the Middle”(MitM) attack
·Trojans
·Ransomware
·Attacks on IoT Devices
·Data Branches.
Organizations and governments have taken a reactive “Point product” approach to combating cyber threats. They use four strategies that are leading the battle for cyber threat detection and prevention. They are:

1.AI and Machine learning
2.Technical Integration,
3.Merging existing and new technologies and
4.Flexible endpoint solutions.

Cyber security not only helps to prevent cyber attacks but also worked on data branches and identity guilt and can aid in risk management. It is also important because government, military, corporate, financial and medical organizations collect, process and store unprecedented amounts of data for which unauthorized access or exposure could have negative consequences. Even the organizations transmit sensitive data across networks and to other devices in the course of doing businesses and cyber security describes the discipline dedicated to protecting that information and the systems used to process or store it.

Hence on today’s date cyber security is the burning topic to work on. The demand will be definitely full filled by the ethical hackers and other cyber security providing organizations.