Asslam-u-alaikum๐
๐Hi Steemians hope you all are well and enjoying your day, I'm also good by the grace of ALLAH almighty.๐ฎ
Steemians in this technology era we are use many gadgets those makes our life easier. We use these gadgets every day like mobile phone, Computer, Tabs & notebook computer etc. Due to depending on computer the field of technology having important compact on Global atmosphere. We use Internet With Wireless Technology Like Wi-fi on our devices Computer, Tabs, notebook and On Mobile phone. The Internet relay on CyberSecurity.
CyberSecurity is a most important part of Technology Era nowadays.
pixabay.com
History of Cyber Security
In beginning of computer history, there's a little bit security was found like in 1970 to 1980.
First antivirus software was programmed for privilege computer system from Malware. That's having not enough security for computer system.
www.encrypted-tbn0.gstatic.com
When in 1990 the antivirus spread on a large scale. The Programming provided companies are thinking about the introduce of technology that can save there data from bugs and malware. Finally they introduced CyberSecurity approximately in 2010. Because there's attacks on Government Data & Banking Accounts of Globally.
pixabay.com
The computer system financial institutions like Commercial Banks, Stock Exchanges & Website those accept Credit cards are the most important & first target of the Hackers. The ATM and stores are hacked through the PIN & transferred data within seconds.
pixabay.com
Types of Cybersecurity๐
There's some types of Cybersecurity are as under.
๐Data security
๐Application security
๐Mobile security
๐Cloud โ๏ธ computing security
๐Network security
How CyberSecurity Does Works
The main function of cybersecurity is to provide extra security (Protection) for the program that's uses in the Business.
In order to creat extra protection against Hackers the cybersecurity is a solid solution for running the technology and Business together in a smooth way.
CyberSecurity system thats works properly, will work on
first Detect the problem,
secondly investigation of problem
Finally resolved problem
And running the same system before the Hackers attack.
Steemians I hope you find this information useful. Thanks for reading my article on CyberSecurity
Special Thanks
@cryptokraze
@siz-official
@vvarishayy
@suboohi
Regards๐ผ @saami
Please write a correct title and spelling of Tutorials. You write a wrong spelling of tutorial word.
And make a justify your text because then your post is more valuable and attractive to see for everyone.
Regards, Faran Nabeel
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Thank you so much for letting me know. I will take special care of this next time.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit