1 00:00:00,480 --> 00:00:03,040 Now, what is cybersecurity now? 2 00:00:03,060 --> 00:00:09,180 Cyber security is a practice of defending computer servers, mobile devices, electronic systems, networks 3 00:00:09,180 --> 00:00:10,980 and data from malicious attacks. 4 00:00:11,490 --> 00:00:17,100 And it is also known as information technology security or electronic information security. 5 00:00:17,400 --> 00:00:23,280 No, that applies in a variety of contexts, from business to mobile computing, and can be divided 6 00:00:23,280 --> 00:00:25,020 into a few common categories. 7 00:00:25,410 --> 00:00:29,340 Now the categories the first thing, which is the network security. 8 00:00:29,580 --> 00:00:36,900 Now it is the practice of securing a computer network from intruders, whether targeted attackers or 9 00:00:36,930 --> 00:00:39,000 opportunistic malware. 10 00:00:39,210 --> 00:00:41,280 Now we have the application security now. 11 00:00:41,310 --> 00:00:46,670 It is focuses on keeping software and device free of threats are compromised. 12 00:00:46,680 --> 00:00:50,790 Application could provide access to the data it's designed to protect. 13 00:00:51,330 --> 00:00:57,030 So successful security begins in the design stage well before a program or device is deployed. 14 00:00:57,060 --> 00:01:03,930 Information security It protects the integrity and privacy of data both in storage and in. 15 00:01:04,440 --> 00:01:06,120 Operational security. 16 00:01:06,150 --> 00:01:11,570 It includes their processes and decisions for handling and protecting data assists. 17 00:01:12,510 --> 00:01:19,230 Now we have the disaster recovery and business continuity, define how an organization responds to cyber 18 00:01:19,230 --> 00:01:25,020 security incidents or any other event that causes the loss of operation or did.