Types of Cyber Security
Cyber security is classified into the following types:
Information security aims to protect the users’ private information from unauthorized access, identity theft. It protects the privacy of data and hardware that handle, store and transmit that data. Examples of Information security include User Authentication and Cryptography.2
Network Security consists of the policies and practices adopted to protect network traffic by controlling incoming and outgoing connections to prevent threats from entering or spreading on the network.1 Examples of Network Security includes Antivirus and Antispyware programs; Firewalls that block unauthorized access to a network; VPNs (Virtual Private Networks) used for secure remote access.2
Data Loss Prevention (DLP)
Data Loss Prevention protects data by focusing on the location, classification and monitoring of information at rest, in use, and in transit.2 Examples of the information contained within an object would include a file, email, packet, application, or data store.
Cloud computing security, or more simply, cloud security refers to a broad set of polices, technologies, and controls that work together to protect cloud-based systems, data, and infrastructure. Cloud security includes detective controls, identity management, physical security, data confidentiality, encryption, and compliance.3
Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS)
Intrusion Detection Systems monitor a network or system for malicious activity or policy violations. Violations are typically reported to an administrator or collected centrally using a Security Information and Event Management (SIEM) system.3
Identity and Access Management (IAM)
Identity and access management is an authentication service to limit and track individuals access to technology environments. This will ensure appropriate access to resources in a way that protects systems from malicious entities.
Encryption is the process of encoding data to render it unintelligible, and is often used during data transfer to prevent theft in transit.2
Antivirus and Anti-malware
Antivirus and anti-malware solutions scan computer systems for threats. The sophistication of today’s threats require a solution that scan, detect, and protect systems in an automated way without relying on local threat definition files. The ability to deal with unknown threats based on behaviour is a fundamental requirement.2
Sources: 1 Forcepoint, 2Comodo One, 3Wikipedia