1 00:00:00,510 --> 00:00:06,870 Now, what is cybersecurity now, cyber security is a practice of defending computer servers, mobile 2 00:00:06,870 --> 00:00:13,650 devices, electronic systems, networks and data from malicious attacks, and it is also known as information 3 00:00:13,650 --> 00:00:17,060 technology, security or electronic information security. 4 00:00:17,640 --> 00:00:21,870 That applies in a variety of context, from business to mobile computing. 5 00:00:22,050 --> 00:00:25,030 And it can be divided into a few common categories. 6 00:00:25,440 --> 00:00:29,340 Now, the categories, the first thing which is then network security. 7 00:00:29,580 --> 00:00:36,900 Now it is the practice of securing a computer network from intruders, whether targeted attackers or 8 00:00:36,960 --> 00:00:39,000 opportunistic malware. 9 00:00:39,240 --> 00:00:40,910 Now we have the application security. 10 00:00:40,950 --> 00:00:45,600 Now it is focuses on keeping software and device free of threats. 11 00:00:45,870 --> 00:00:52,350 A compromised application could provide access to the data it's designed to protect so successfully. 12 00:00:52,350 --> 00:00:57,030 Security begins in the design stage well before a program or device is deployed. 13 00:00:57,150 --> 00:00:58,320 Information security. 14 00:00:58,470 --> 00:01:04,440 It protects the integrity and privacy of data both in storage and in transport. 15 00:01:04,470 --> 00:01:06,130 Operational security. 16 00:01:06,150 --> 00:01:11,610 It includes the processes and decisions for handling and protecting data assists. 17 00:01:12,510 --> 00:01:19,260 Now we have the disaster recovery and business continuity define how an organization responds to cyber 18 00:01:19,260 --> 00:01:25,050 security incidents or any other event that causes the loss of operation ordered.