+ 6
What is Cyber Security ??? What are the carrier paths of Cyber Security ???
I really want to know what is Cyber Security and what are the topics include in that. Can you please suggest me good website or tutorials for learn Cyber Security . 💐🌸💮🏵🌹🥀🌺🌻🌼🌷🍁
3 ответов
+ 3
Lemme breakdown for you "Cyber" is the internet, using which you are online, but being online and using internet are 2 different things. Cyberspace as it is the vast world of online networks giving you access to the internet, when you open your browser you know what you are looking at is the fresh copy of rendered information traversing through the nodes from the server. Now, as you know security is required to prevent tempering of this info, so that correct information is displayed to you. This isn't just limited to users and clients or servers, there's a lot of things going on in here. When you request from a server for a webpage or an application, it loads almost instantaneously, but is that server very close to your machine? In most cases no, there exists copy of pages cached in your system as well as on the nearest servers you are connected with within a network. In most cases which are used for faster loading whereas an application may take a different approach depending on the system design
+ 3
Every system or proprietary system is build keeping security in mind, but flaws could be inevitably many and these are what a cyber attacker use to exploit, these flaws in the system. How to find them? Is a job of a penetration tester who seeks for the holes in the system and how an intruder can penetrate within. But finding it for a system designer could be easy but not all of them, a specialist may can but if still there exists even one can be exploited. Now once flaw(s) is noticed, attacker exploits and penetration tester tries to patch it up or fix it. While doing this he/she may create more vulnerabilities which are the actual spot on for attackers to exploit. Now these vulnerabilities aren't just caused or noticed; there could be vulnerabilities lying in security or firewalls, access times, vulnerable times and also in the underlying set of protocols that govern cyber-communication.