DataStructures / Cyber Security Interview Questions
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
Cybersecurity can be categorized into 7 distinct types:
- Network Security,
- Cloud Security,
- Endpoint Security,
- Mobile Security,
- IoT Security,
- Application Security,
- and Zero Trust.
Network security is the process of safeguarding your data from unauthorized entry through your computer networks. Network security includes software and hardware technologies and ensures your security from a variety of threats. It acts as a wall between your network and malicious activity and as an organization, you want to protect your network so you can constantly deliver services to meet the demands of your employees and customers. Generally, protecting your reputation as a business.
Types of Network Security:
Information Security or InfoSec is the process of designing and deploying tools to safeguard your critical business information from destruction, disruption, and alteration. It is a crucial factor in cybersecurity and it is specifically designed for data security.
The main objective of InfoSec is the confidentiality, integrity, and availability (CIA) of your business data. Its objective is to guarantee that only authorized users, apps, or systems can access certain information.
Types of Information Security:
- Cloud Security. Mainly focuses on the vulnerabilities coming from Internet services and shared environments. It protects the application and Infrastructure security from cloud-connected components.
- Cryptography. This is a process of obscuring content to secure information and only the user with the correct encryption key can access the encrypted data. Cryptography retains the confidentiality and integrity of data in transit and storage.
- Vulnerability Management. This type of InfoSec is a process where it scans the environment for any weak spots, such as unpatched software. For growing businesses that are constantly adding new users, applications, or updates with infrastructure, this is an important factor to monitor potential exposures.
- Incident Response. A role where it monitors and probes possibly malicious behavior. To contain threats and ensure that your network can be restored, an incident response plan is essential. Also, this preserves evidence for possible prosecution and further prevent breaches.
Endpoint security is the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, and mobile devices from being exploited by malicious actors and campaigns.
Endpoint security systems protect these endpoints on a network or in the cloud from cybersecurity threats. Endpoint security has evolved from traditional antivirus software to providing comprehensive protection from sophisticated malware.
Examples of endpoints include desktop computers, smartphones, tablets, laptops, and Internet of Things (IoT) devices.
Endpoint Protection Platform (EPP) primarily focus on preventing malware and are comparable to what you'd expect from a reactive antivirus program.
Endpoint Detection and Response (EDR) offers the same features as EPPs but also has the capability to respond to active threats in real-time.
Extended Detection and Response (XDR) platform offers better protection and deeper risk analysis than an EDR. XDRs provide more visibility and rely heavily on automation to correlate and eliminate threats.
The 5 C's of cyber security are five areas that are of significant importance to all organizations: change, compliance, cost, continuity, and coverage.