fbpx
skip to content

Spread the word.

Share the link on social media.

Share
  • Facebook
Have an account? Sign In Now

Sign Up

Join us to discover alumni reviews, ratings, and feedback, or feel free to ask any questions you may have!

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Analytics Jobs

Analytics Jobs Logo Analytics Jobs Logo
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Popular Course Rankings 2024
    • Best Data Science Course
    • Best Full Stack Developer Course
    • Best Product Management Courses
    • Best Data Analyst Course
    • Best UI UX Design Course
    • Best Web Designing Course
    • Best Cyber Security Course
    • Best Digital Marketing Course
    • Best Cloud Computing Courses
    • Best DevOps Course
    • Best Artificial Intelligence Course
    • Best Machine Learning Course
    • Best Front end-Development Courses
    • Best Back-end Development Courses
    • Best Mobile App Development Courses
    • Best Blockchain Development Courses
    • Best Game Designing/Development Courses
    • Best AR/VR Courses
  • Popular Career Tracks 2024
    • How to become a data scientist?
    • How to become a full stack developer?
    • how to become a product manager?
    • how to become a data analyst
    • how to become a ui ux designer
    • how to become a web designer?
    • how to become a cybersecurity professional?
    • how to become a digital marketing expert
    • how to become a cloud engineer?
    • how to become a DevOps engineer?
    • Career in artificial intelligence
    • how to become a machine learning engineer?
    • How to become a Front-end Developer
    • How to Become a Back-end Developer
    • How to become a mobile app developer?
  • Suggest Me a Course/Program
  • AJ Founders
  • Looking for Jobs?
    • Jobs in Data Science
    • Jobs in Javascript
    • Jobs in Python
    • Jobs in iOS
    • Jobs in Android

Analytics Jobs Latest Questions

Navya Nanda
Navya NandaBeginner
Asked: November 3, 20222022-11-03T13:32:59+05:30 2022-11-03T13:32:59+05:30In: Data Science & AI

What is Cyber Security? Cyber Security kya h?

Cyber Security kya h. Name some uses of Cyber Security. 

cyber security
  • 2 2 Answers
  • 30 Views
  • 0 Followers
  • 0
    • Report
  • Share
    Share
    • Share on Facebook
    • Share on Twitter
    • Share on LinkedIn
    • Share on WhatsApp

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

2 Answers

  • Voted
  • Oldest
  • Recent
  • Random
  1. Kasif Ansari
    Kasif Ansari
    2022-11-04T18:41:14+05:30Added an answer on November 4, 2022 at 6:41 pm

    Cyber security is the execution of protecting systems, networks, and programs from digital attacks. These cyberattacks usually aim to assess, change, or destroy sensitive information, extort money from users, or interrupt normal business processes.
    Cyber security is the implementation of technologies, processes, & controls to protect systems, programs, devices, networks, & data from cyber-attacks. It aims to control the risk of cyber-attacks and protect against unauthorized access to systems, networks, and technologies.
    Cybersecurity professionals can use artificial defensive intelligence (AI) to detect or stop cyberattacks. Savvy cybercriminals use technologies like offensive AI and adversarial machine learning because they are more difficult for traditional cybersecurity tools to see.
    Cybersecurity can be categorized into 5 types:
    Critical infrastructure security.
    Application security.
    Network security.
    Cloud security.
    Internet of Things (IoT) security.
    The priority of cyber security is to protect all organizational assets from external and internal threats and disruptions caused due to natural disasters.
    Cybersecurity is crucial for the government and other organizations that directly affect the nation’s or world’s well-being and safety. Cyberattacks on government, military groups, and defense suppliers are starting to supplement or replace physical attacks, putting nations in danger.
    Benefits of Investing in Cyber Security
    Protection against external threats
    Protection against internal threats
    Regulation compliance
    Improved productivity
    Cost savings and value
    Brand trust and reputation
    Cyber security’s risk is related to the loss of confidentiality, integrity, or availability of information, data, or information to systems. It reflects potential adverse impacts on organizational operations, assets, individuals, and other organizations.
    Generally, the disadvantages of cyber security also come in the following: Firewalls are tricky to set up correctly. An incorrectly constructed firewall may block users from engaging in specific Internet activity until the firewall is configured correctly. Slows down the system even more than before.
    Cyber threats protect internet-connected systems such as hardware, software, and data. Individuals and enterprises use the practice to protect against unauthorized access to data centers and other computerized systems.

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  2. Katy Johnson
    Katy Johnson
    2022-11-04T18:42:56+05:30Added an answer on November 4, 2022 at 6:42 pm

    Cyber security is the exercise of defending computers, mobile devices, servers, electronic systems, networks, and data from vicious attacks. It’s also popular as electronic information security and information technology. The word applies in various contexts, from business to mobile calculating, and can be severed into a certain classification.
    Network security is the custom of securing a computer network from a trespasser, whether targeted attackers or opportunistic firmware.
    Application security emphasizes holding software and devices without intimidation. A compromise and application could allow access to the data it created to protect. Successful security arises in the design stage; well in advance, a program or device is arrayed.
    Information security protects the supremacy and solitariness of data, both in storage and in traverse.
    Operational security includes the procedure decisions for processing and safeguarding data assets. The approvals users have when approaching a network and the methods that determine how and where data may be stored or shared.
    Disaster recovery and business continuity say how an organization retorts to a cyber-security contingency or any other event that causes the loss of data. Disaster recovery principles dictate how the organization revives its operations and information to revive to the same operating capacity as prior to the incident. Business continuity is the propose the organization refers to trying operation without any specific resources.
    End-user education discourses the most erratic cyber-security factor: Humans. Anyone can incidentally be designed a virus to an alternatively secure system by frailty to follow good security services. Teaching customers to delete dubious email attachments, not plug in anonymous USB drives, and several important chapters are vital for the security of any organization.

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Suggest Me a Course
top-10-data-science-machine-learning-institutes-in-india-ranking 2024
top-30-companies-in-india-to-work-for-in-data-science-and-machine-learning
data-science-b-tech-colleges-in-india
  • Popular
  • Answers
  • Subhash Kumar

    Henry Harvin Reviews - Career Tracks, Courses, Learning Mode, Fee, ...

    • 82 Answers
  • Analytics Jobs

    Scaler Academy Reviews – Career Tracks, Courses, Learning Mode, Fee, ...

    • 44 Answers
  • Analytics Jobs

    UpGrad Reviews - Career Tracks, Courses, Learning Mode, Fee, Reviews, ...

    • 42 Answers
  • Surbhi Gupta
    Surbhi Gupta added an answer I would like to share my experience in Almabetter with… June 12, 2025 at 11:20 am
  • Anonymous added an answer My experience with TopMentor has been nothing short of transformative,… June 12, 2025 at 11:20 am
  • Anushka Bhagat
    Anushka Bhagat added an answer My experience in Ingrade is like a worst nightmare, my… June 6, 2025 at 5:47 pm

Related Questions

  • University of Richmond Boot Camps Reviews - Career Tracks, Courses, ...

    • 0 Answers
  • NYC Data Science Academy Reviews - Career Tracks, Courses, Learning ...

    • 0 Answers
  • Science to Data Science Reviews - Career Tracks, Courses, Learning ...

    • 0 Answers
  • iO Academy Reviews - Career Tracks, Courses, Learning Mode, Fee, ...

    • 0 Answers
  • Zaka Reviews - Career Tracks, Courses, Learning Mode, Fee, Reviews, ...

    • 0 Answers

Category

  • Accounting and Finance
  • AJ Finance
  • AJ Tech
  • Banking
  • Big Data
  • Blockchain
  • Blog
  • Business
  • Cloud Computing
  • Coding
  • Coding / Development
  • Course Review & Ranking
  • Cyber Security
  • Data Science & AI
  • Data Science, Artificial Intelligence, Analytics
  • DevOps
  • Digital Marketing
  • Grow My Business
  • Leadership
  • My StartUp Story
  • Product Management
  • Robotic Process Automation (RPA)
  • Software Testing
  • Start My Business
  • Wealth Management

Explore

  • Popular Course Rankings 2024
    • Best Data Science Course
    • Best Full Stack Developer Course
    • Best Product Management Courses
    • Best Data Analyst Course
    • Best UI UX Design Course
    • Best Web Designing Course
    • Best Cyber Security Course
    • Best Digital Marketing Course
    • Best Cloud Computing Courses
    • Best DevOps Course
    • Best Artificial Intelligence Course
    • Best Machine Learning Course
    • Best Front end-Development Courses
    • Best Back-end Development Courses
    • Best Mobile App Development Courses
    • Best Blockchain Development Courses
    • Best Game Designing/Development Courses
    • Best AR/VR Courses
  • Popular Career Tracks 2024
    • How to become a data scientist?
    • How to become a full stack developer?
    • how to become a product manager?
    • how to become a data analyst
    • how to become a ui ux designer
    • how to become a web designer?
    • how to become a cybersecurity professional?
    • how to become a digital marketing expert
    • how to become a cloud engineer?
    • how to become a DevOps engineer?
    • Career in artificial intelligence
    • how to become a machine learning engineer?
    • How to become a Front-end Developer
    • How to Become a Back-end Developer
    • How to become a mobile app developer?
  • Suggest Me a Course/Program
  • AJ Founders
  • Looking for Jobs?
    • Jobs in Data Science
    • Jobs in Javascript
    • Jobs in Python
    • Jobs in iOS
    • Jobs in Android
aalan

Footer

Social media

About Analytics Jobs

  • About Us
  • Videos
  • FAQs
  • Careers
  • Contact Us
  • Press
  • Sitemap

Our Services

  • Advertise with us
  • Upcoming Awards & Rankings
  • Write for us

Our Brands

  • AJ Founders
  • Aj Tech
  • AJ Finance
  • AJ Entertainment

Terms

  • Terms of Use
  • Privacy Policy
  • Disclaimer

Footer 1

Copyright © , Analytics Jobs. All right reserved.

Get Free Career
Counselling from
Experts

Book a Session with an
Industry Professional today!
By continuing you agree to our Terms of Service and Privacy Policy, and you consent to receive offers and opportunities from the Analytics Jobs platform listed EdTech’s by telephone, text message, and email.