Skip to main content

What is Cyber ​​Security?

What is Cyber ​​Security?


Cyber ​​Security is a technological method that includes a special computing ability that expresses the protection of confidential data by ensuring the security of institutions or international organizations, from information security to computer systems and operational security.

This system, also known as information technology and electronic information security, is valid at various stages from businesses to mobile computing, but it forms the basis of many categories. It adapts a cybersecurity circle, such as network security, application security, information security, operational security, and maintaining the continuity of the current process in extraordinary situations to the technological process.

Cybersecurity, which contains multiple layers of protection, acts as an effective defense mechanism against many situations from cyber crimes to cyber attacks. The fact that the critical functions of the institutions, organizations, and users are available in the cyber environment, as well as the availability of critical functions, constitute the basis of an effective security strategy against cyber attacks. It brings.

With the rapid transformation of digital transformation, the emergence of new threats through the digital world has affected the importance of the security phenomenon against cyber attacks both on a global and regional scale. Cybersecurity and the strategies of the states in this direction, which are tried to be examined in the field of international relations, have brought a new dimension in the political field, and the breakthroughs in the cyber field have reflected its determinative character at the level of strategy to international policies.

There are many formulas to ensure the security of cybersecurity both for individuals and institutions. If we list them;

Updating the software and operating system.
Using strong passwords and antivirus software.
Not opening e-mail attachments from unknown senders.
Avoid using unsecured wifi connections in public places.
Providing electronic security protocols against malware detection.
To receive user training on cybersecurity related issues.
There are various alternatives for ensuring cybersecurity like the measures mentioned above.

Follow me on Skillshare: My SkillShare Profile

Popular posts from this blog

Does turning the computer off and on every day reduce its lifespan?

 Does turning the computer off and on every day reduce its lifespan? Turning off your computer every day or leaving it on all the time increases its lifespan? While turning off your computer at the end of the day really means you are exposing it to additional wear and tear, in fact, the actual wear comes from the act of safely shutting down the computer, not when you turn it on later. Just as the internal combustion engine in cars is subject to increased wear during start-up due to the high levels of friction created by moving parts, a personal computer is subject to a similar type of start-up wear. However, this is directly proportional to the multitude of mechanical parts inside the computer. In other words, modern computers have almost no moving parts, except for a few fans and the hard drive, which is now rare. However, there may still be wear with the inrush current given to the circuits. Because electronic circuits consisting of indicators, capacitors and transformers draw a ...

Experts warned! Don't click on this post

Experts warned! Don't click on this post Experts warned users about the heavily used WhatsApp application. Special days, such as celebration messages that appear to be links to the virus and said that these messages should not be clicked.

WhatsApp, Cevapsız Aramaları Etkileyen Kötü Amaçlı Yazılım Keşfetti

Şirket, "gelişmiş bir siber aktör" tarafından hazırlanan casus yazılımların, popüler WhatsApp iletişim programı aracılığıyla, uygulama içi sesli görüşmelerde herhangi bir kullanıcı müdahalesi olmadan, çok sayıda hedefli cep telefonunu etkilediğini belirtti. Financial Times, oyuncuyu İsrail’in NSO Grubu olarak tanımladı ve bir WhatsApp sözcüsü daha sonra “gördüğünüz kapsama alanını kesinlikle reddetmediğimizi” söyledi. Facebook yan kuruluşu sözcüsü Pazartesi günü geç saatlerde yaptığı açıklamada, kötü amaçlı yazılımın, uygulamanın sesli arama işlevi aracılığıyla tek başına yapılan cevapsız aramalardan telefonlara sızabileceğini söyledi. Bilinmeyen sayıda insan - en azından düzinelerce bir miktar yanlış olmaz - şirketin Mayıs ayı başında keşfedildiğini söyleyen kötü amaçlı yazılımdan etkilendiğini söyledi. İnternet izleme uzmanı Citizen Lab'ın araştırmacısı olan John Scott-Railton, “çok korkutucu bir güvenlik açığı” olarak adlandırılan hack adını verdi. ”Burada, b...