DEV Community

Cover image for Cybersecurity 101 - Part 3
Bala Madhusoodhanan
Bala Madhusoodhanan

Posted on

Cybersecurity 101 - Part 3

This week we are exploring the necessity of protecting the infrastructure in which our system runs on (servers, data centers, communication systems, electricity etc..). This branch of cyber security is Infrastructure protection services

Imagine that you have a toy castle, and you want to keep it safe from being knocked over or damaged. You might put it on a shelf where it can't be easily reached, or you might put it in a box where it will be protected from being bumped or dropped. That's kind of like what infrastructure protection services do. They help to keep important things like roads, bridges, and power plants safe and working properly, so that people can use them without worrying about them being damaged or broke

  • Network Protection refers to the measures that are put in place to keep computer networks and the data that is transmitted over them safe and secure. It encompasses variety of topics ranging from firewall, Secure Proxy, Content filtering to VPN.

Imagine that you have a treasure chest with lots of valuable jewels inside. You would want to keep it safe from thieves, right? You might put a lock on the chest, or hide it in a secret place where no one else can find it. That's kind of like what network protection does. It helps to keep the information that is transmitted over computer networks safe and secure, so that no one can access it without permission.
Network protection helps to keep online accounts and personal information safe, or how it might prevent viruses and other malware from infiltrating a computer system.

  • Server/Endpoint protection refers to the measures that are put in place to protect servers and endpoint devices (like computers and laptops) from cyber threats such as viruses, malware, and hacking attacks. The system design to protect should consider a lot of topics like Whitelisting, antivirus, browser isolation etc..

Imagine that you have a castle and you want to keep it safe from being attacked by an enemy. You might put up a fence around the castle, or you might hire guards to stand watch at the gates. That's kind of like what server/endpoint protection does. It helps to keep servers and endpoint devices safe from being attacked by cyber threats, like viruses and hackers. It does this by using things like firewalls and antivirus software to keep unwanted things out, and by making sure that the servers and devices are always up to date with the latest security patches.
Server/endpoint protection might help to keep a company's confidential data safe from being accessed by unauthorized people, or how it might prevent a computer from being infected with a virus that could damage or destroy important files.

  • Application Protection refers to the measures that are put in place to protect software applications (like games or word processors) from being hacked or compromised in some way.

Imagine that you have a toy box with all of your favorite toys inside. You want to keep your toys safe from being broken or stolen, right? You might put a lock on the toy box, or you might keep it in a safe place where no one else can get to it. That's kind of like what application protection does. It helps to keep software applications safe from being hacked or damaged, so that you can use them without worrying about them being messed up in some way. Application protection helps to keep a computer's operating system from being infected with a virus, or how it might prevent a software application from being used in an unauthorized way.

Top comments (0)