top of page

Cyber Security

April 2018 updated guidelines released by National Institute of Standards and Technology, recommends continuous monitoring and real-time assessment.

Increase in reliance on computer systems and devices, internet, networks, and wireless network, the security has become more essential to avoid theft and damage to hardware, software, and electronic data  . This includes the impact it’ll make if disruption or misdirection of service occurs.

 

Cybersecurity is designed to maintain computer systems, information and data, data center, along with organizational confidentiality, integrity and availability of data.

Elements of CyberSecurity

  • Application Security

  • Information Security

  • Network Security

  • Operational Security

  • End-user Training

Version 1.1 Framework for Improving Critical Infrastructure was released in April 2018 by National Institute of Standard and Technology. The updated guideline released, recommends continuous monitoring and real-time assessment to be done. The Framework is developed for use in banking, communications, businesses, defense, all government sectors and energy industries.

Few Types of Threats

  • Ransomware

  • Malware

  • Social Engineering

  • Phishing

  • Denial of Services (DOS)

  • Eavesdropping

  • Polymorphic attack

  • Privilege escalation

  • Spoofing

  • Backdoor

  • Tampering

bottom of page