Cyber Security is a very wide field and is becoming wider in the coming days. Four main and most important cyber security areas of focus are following:

Network Security:

Network Security contains both hardware and software technologies. The purpose of network security is to protect the usability and integrity of your network and data. It targets different threats. Every Organization that wants to transfer the services that customers and employees demand must protect its network. Network Security is very helpful to protect your proprietary information from attack. Network Security includes Firewalls, Email Security, Antivirus and anti-malware software, Application Security, Cloud Security, Data loss prevention, Mobile device Security, Security information and event management, Web security and wireless security. Effective network security manages access to the network.

Application Security:

The process of making apps more secure by searching, fixing, and enhancing the security of apps is called application security. Application Security includes hardware, software, and procedures that identify or minimize security vulnerabilities. Application software is very helpful in organizations to protect different kinds of applications. For example web, mobile, legacy, desktop and micro services are used by external and internal stakeholders adding customers, business partners and employees. Steps taken to ensure application security are sometimes called countermeasure. The most basic software countermeasure is an application firewall that controls the execution of files or the managing of data by specific installed programs. The most common hardware countermeasure is router that can secure IP addresses of a single computer from being directly visible on the internet.

Information Security:

Information Security consists of processes and methodologies which are designed and implemented to securely print, electronic or any other form of confidential, private and sensitive information or data from illegal access, misuse, disclosure, destruction, modification, or disruption. Information security is abbreviated as Infosec. It is a crucial part of cyber security, but it refers exclusively to the processes designed for data security. Digital signatures can improve information security by enhancing authenticity processes and prompting individuals to prove their identity before they can gain access to computer data. The most common information security threats are software attacks, identity theft, sabotage, physical theft and information extortion.

Data Security:

The process of securing digital information from illegal access, corruption or theft throughout its entire lifecycle is called data security. Data security refers organizational policies and procedures and it also encompasses every aspect of information security from the physical security of hardware, storage devices to administrative and access controls, as well as the logical security of software applications. There are different shapes and forms of data security technology that protects data from a growing number of threats. Many of these threats are from external sources but organization also put their efforts on securing their data from the insider, too. Different ways of security data include encryption, data erasure, data masking and data resiliency.