top of page

Security

Security: Yearly, the stolen research projects reach about 10 billion dollars only in the U S A . Consequently, security becomes an essential part of the system. Security is the defense against the attacks of the hackers, and security is a non-stop process. The types of attacks are phishing, which is the rehearsal of distribution fake communications that look like emails from dependable sources ( credit card details and login data), ransomware, which is the type of malicious software that is considered to extract currency by blocking content to records or the PCs system until the deal is paid, and the maleware, which is the type of software intended to gain illegal right to use the system or to cause impairment to the system. Actually, a threat can be between a minor bug to a complex cloud hijacking liability.

An effective cyber-security method has numerous layers of defense spread across the networks, computers, programs, or information that one aims to keep non-toxic. The processes, the people and the tools must all accompaniment one alternative to generate a real defense on or after cyber-attacks. A unified threat management system can mechanize additions across the security goods and speed up key security processes functions: discovery, examination, and remediation.

Three chief objects essential be threatened, which are endpoint strategies like PCs and handheld devices, and routers; systems; and the cloud. Shared technology cast-off to defend these objects contain next-generation firewalls, DNS pass through a filter, malware defense, antivirus tools and email safety results. Cyber might be distinct as somewhat connected to the collection of workstations or the network. At the same time, security means the mechanism of protecting anything.

Virtual IP is essential, Encryption of partitions [MATH for computer science, Ashraf Sobhi, 2021], emails , browsers , and data across the network, and self-defending device endpoint security controller are the layers of security.

Partition password is the last line of defense is unbreakable. I managed to setup partition password for windows 8.1 ; self-defending device endpoint security controller monitors the system, expand the self-healing protection of the hardware, protect the fireware that the antivirus cannot reach automatically, recovers the BIOS from the maleware rootkits or corruption and guards critical OS processes and restarted if attacked. [Softdigit , computer Page, Ashraf Sobhi]

All what we have seen is the defense against cyber-attackers ; we have to think the other way to cause damage to the attackers by sending an instruction or a function to delete the hard disk , as an example.

Conclusion:

Security is a multi-layer or multi-level, non-stop process. The levels are VIP, encryption, DNS filter, partition password, and self-defending device endpoint security controller . Types of attacks are phishing, ransomware and maleware. The next-generation security must cause damage to the hackers.

Comments


Featured Posts
Check back soon
Once posts are published, you’ll see them here.
Recent Posts
Archive
Search By Tags
No tags yet.
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square
bottom of page