zoukankan      html  css  js  c++  java
  • Network Security Vs Cyber Security

    Where Does Cyber Security Differ?
    Cyber security is much more concerned with threats from outside the castle. Where network security is worried about what is going on within the castle walls, cyber security is watching who is trying to pass through the gate or breach the parapets. The two areas have a lot of overlap, but their areas of concern are quite different. The cyber security specialist is the crusading knight defending the kingdom. Cyber security focuses on the barbarians at the gate and how the castle connects to the world around it.

    Network protection - detecting and protecting against outside attempts to get into the network
    Up-to-date information - staying informed on how attackers and hackers are improving their efforts
    Intelligence - identifying the sources of outside attacks and protecting against them
    Applications - monitoring the use of applications to avoid unintended breaches from within

    What is Network Security?
    If the field of internet security is attractive to you, you need to know the important distinction between network security and cyber security. If you think of a company as castle fortified against outside threats, network security is concerned about maintaining peace and calm within the walls of the castle. It focuses on maintaining the fortifications, of course, but its primary purpose is to guard against problems from within. A person concerned with network security will be focusing on protecting a company's internal information by monitoring employee and network behavior in several ways. They are the shire reeve responsible for keeping peace in the land.

    IDs and passwords - making certain they are effective and updated frequently

    Firewalls - keeping outside threats at bay
    Internet access - monitoring the sites employees visit on the company's computers
    Encryption - making certain that company information is useless to anyone outside the company
    Backups - scheduling regular backups of company information in case of a hardware malfunction or successful outside threat
    Scans - conducting regular virus and malware scans to detect any outside infection

    No pains, No gains
  • 相关阅读:
    史上最详细 Linux 用户与用户组知识
    MySQL -2- 体系结构--随笔小记
    MySQL -2- 体系结构
    MySQL -1- 简介及安装
    MySQL -0- 课程大纲及课程链接
    探索Windows命令行系列(4):通过命令操作文件和文件夹
    探索Windows命令行系列(3):命令行脚本基础
    探索Windows命令行系列(2):命令行工具入门
    探索Windows命令行系列(1):导航目录
    Oracle 分页方法研究
  • 原文地址:https://www.cnblogs.com/Rightsec/p/14526579.html
Copyright © 2011-2022 走看看