What is Cyber Security and Why Is It Important?

Malicious attacks must be prevented at all nodes and endpoints in the network. As a result, Cyber Security or Information Security refers to the process of securing and minimising the effects of attacks on nodes such as servers, computers, and cell phones.

The word itself has a wide range of meanings that change depending on the context. It can be broken down into a few basic categories:

  1. Cloud Security: A software-based tool that protects and tracks data in the cloud, eliminating the possibility of an on-premises attack.
  2. Application Security: It focuses on preventing threats to applications and computers. A hacked application could allow access to the data it was supposed to secure.
  3. Data Loss Prevention: This includes establishing protocols, processes, and procedures for managing and mitigating data loss, as well as creating recovery policies in the event of a cyber security breach.
  4. Operational Security: This refers to the procedures and decisions used to manage and secure data assets.
  5. End-user education: This entails raising awareness as well as educating users how to avoid cyber breaches by following best practises such as avoiding unknown files and so on.
  6. Information Security: It safeguards both physical and digital data against unauthorised access, use, modification, disclosure, or deletion, as well as other types of malicious intent.
  7. Cyber-physical systems such as the electricity grid, nuclear power plants, and water purification systems are all part of critical infrastructure security.
  8. Network Security: This applies to the protecting of infrastructure to secure internal networks from intruders.

Why is Cyber-Security important?

“In the modern age, no one can guarantee that data is completely safe; it might be secure for the time being, but it may not be as secure in the future.”

Data breaches are so normal these days that we don’t even notice them if they aren’t on a wide scale.

According to a study released by RiskBased Security, data breaches exposed 7.9 billion information in the first nine months of 2019. This is more than double (112%) the number of documents exposed in the same time frame last year.

There were several cyber-breach incidents in 2020. For example, the SolarWinds cyber attack and the Twitter Bit-Coin Scam both resulted in monetary loss and data breaches, but also damaged the company’s credibility.

As a result, Cyber Security is critical in order to avoid any of these cyber breaches or, to put it another way, to minimise the attacks!

Forms of Cyber Attacks

The platform for cyber attacks has expanded rapidly as the use of technology has increased in every industry.

Cyber threats come in a variety of sizes and shapes. Any of them may be ransomware designed to extort money from victims, or they may be a clandestine activity by hackers aimed at removing unauthorised and useful data from the system.

Some of the basic types of cyber attacks are:

  • Social Engineering
  • Man-In-Middle Attack (MITM)
  • Zero-day Attack
  • Eavesdropping Attack
  • Ransomware
  • DDOS Attack
  • Phishing
  • Malware


This was the little introduction to the cyber security , domains of cyber security , why is it important and the cyber attacks and its type.

For more updates stay tuned!!

Happy Hacking!!




Just an another security nerd… CEH MASTER | PENTESTER

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Arweave Puzzle Series: Puzzle 02— Solved

Lamport Signatures for a Post-Quantum Computing World


{UPDATE} Marbles Plus Hack Free Resources Generator


DevSecOps Servant at SCS — Cybersecurity Career Mentorship Programme

[ Features ] How To Get Hacked

AMA Publication

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Vikas Sharma

Vikas Sharma

Just an another security nerd… CEH MASTER | PENTESTER

More from Medium

Top 10 Web Application Vulnerabilities Pt. 1

How to not be a script kiddie in 2022

TryHackMe: [Day 6] Web Exploitation Patch Management Is Hard

Cybersecurity And Much More Newsletter — Week 05 (2022)