Student of group 961-21 Babadjanov Jamshid English lesson Self studies




Download 193.72 Kb.
bet1/4
Sana02.04.2024
Hajmi193.72 Kb.
#185131
  1   2   3   4
Bog'liq
6-Topic IT security and safety
17-mа’ruzа. Kvant elektronikasi elementlari rejа, 971-21 гурух Якубов Т AMD процессорларининг хусусиятлари, Tebranishlarning so‘nish koeffisienti. So‘nishning logarifmik dekrementi va tizimning aslligi. So‘nuvchi mexanik tebranishlar., Чўлпоннинг “Кеча ва кундуз” романини ўқиш, 7-Topic Multimedia, 1-Topic Types of computers, Abstrakt sinflar tashkil etish va ulardan foydalanish usullari, Konstruktorlar va ularni tashkil etish usullari, 961-21 O‘rnatilgan tizimlarda qo‘llaniladigan zamonaviy protsessorlar

Student of group 961-21 Babadjanov Jamshid English lesson Self studies
Topic-6
IT security and safety
What Is IT Security?

IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers.

  • How IT Security Works

  • Types of IT Security

  • Related Topics

Contact Cisco
What is the need for IT security?
As hackers get smarter, the need to protect your digital assets and network devices is even greater. While providing IT security can be expensive, a significant breach costs an organization far more. Large breaches can jeopardize the health of a small business. During or after an incident, IT security teams can follow an incident response plan as a risk management tool to gain control of the situation.
What is the difference between IT security and information security (InfoSec)?
Although IT security and information security sound similar, they do refer to different types of security. Information security refers to the processes and tools designed to protect sensitive business information from invasion, whereas IT security refers to securing digital data, through computer network security.
What are the threats to IT security?
Threats to IT security can come in different forms. A common threat is malware, or malicious software, which may come in different variations to infect network devices, including:

  • Ransomware

  • Spyware

  • Viruses

These threats make it even more important to have reliable security practices in place. Learn more about malware to stay protected.
How do I benefit from IT security?
IT security prevents malicious threats and potential security breaches that can have a huge impact on your organization. When you enter your internal company network, IT security helps ensure only authorized users can access and make changes to sensitive information that resides there. IT security works to ensure the confidentiality of your organization’s data.
Types of IT security
Network security
Network security is used to prevent unauthorized or malicious users from getting inside your network. This ensures that usability, reliability, and integrity are uncompromised. This type of security is necessary to prevent a hacker from accessing data inside the network. It also prevents them from negatively affecting your users’ ability to access or use the network.
Network security has become increasingly challenging as businesses increase the number of endpoints and migrate services to public cloud.
Internet security
Internet security involves the protection of information that is sent and received in browsers, as well as network security involving web-based applications. These protections are designed to monitor incoming internet traffic for malware as well as unwanted traffic. This protection may come in the form of firewalls, antimalware, and antispyware.
Endpoint security
Endpoint security provides protection at the device level. Devices that may be secured by endpoint security include cell phones, tablets, laptops, and desktop computers. Endpoint security will prevent your devices from accessing malicious networks that may be a threat to your organization. Advance malware protection and device management software are examples of endpoint security.
Cloud security
Applications, data, and identities are moving to the cloud, meaning users are connecting directly to the Internet and are not protected by the traditional security stack. Cloud security can help secure the usage of software-as-a-service (SaaS) applications and the public cloud. A cloud-access security broker (CASB), secure Internet gateway (SIG), and cloud-based unified threat management (UTM) can be used for cloud security.
Application security
With application security, applications are specifically coded at the time of their creation to be as secure as possible, to help ensure they are not vulnerable to attacks. This added layer of security involves evaluating the code of an app and identifying the vulnerabilities that may exist within the software.
I recently attended the TCEA SysAdmin conference in Texas and was intrigued by the workshop: Cyber Safety and Security. Miguel Guhlin presented important ideas regarding the differences in cyber safety and security that are often missed by K12 district administrations.
In truth, my team and I hear the misconception just about every day. We often talk with directors, managers, and system admins who are currently using tools such as Gaggle, GoGuardian, Bark, or Securly and believe they are covered. In truth, if your district is using G Suite for Education and/or Office 365, your content filter and campus safety tools are not enough to secure sensitive, regulated data.
I get it. The amount of information and noise around the subject is overwhelming. As Guhlin writes: There is a beguiling amount of jargon and vocabulary relevant to cybersecurity (systems and things) and cybersafety (people).
Last week, I received a notification that a student decided to use pepper spray at my son’s middle school. As much as that freaked me out, I know it gets a lot worse. So trust me when I say that, as the father of two school-aged children, I absolutely believe in the need for campus and cyber safety technology in our schools.
I’m also well aware of the risks to my kids’ (as well as my wife’s and my) identity security as a result of insufficient cybersecurity. K12 school cyber attacks are on the rise. As is identity theft for school-aged students, whose credit information can often be used for years before the fraud is detected.
For these reasons, I am passionate about cyber safety and security in K12 school districts. The important thing for district IT and system admins to understand is that these are two fundamentally different topics. As are the solutions needed to manage them.

Download 193.72 Kb.
  1   2   3   4




Download 193.72 Kb.

Bosh sahifa
Aloqalar

    Bosh sahifa



Student of group 961-21 Babadjanov Jamshid English lesson Self studies

Download 193.72 Kb.