The cybersecurity refers to the prevention of cyberattacks or hacking of internet-enabled systems from the attackers or hackers and protection of interconnected systems and devices such as hardware, software, data and information. The general meaning of security in the context of computing has two basic components such as security in relation to cybersecurity and physical security. Both are meant to be protected against unauthorised access of data and information as well as the entire computerised system. The NIST or the national institute of standards and technology in relation to the US government cybersecurity released the updated version of guidelines in April 2018 which recommends regular and continuous monitoring as well as assessment towards improving critical and advanced cybersecurity systems to effectively tackle cyber-attacks.
Similarly, the CSF or the voluntary cybersecurity framework which is developed to use in the banking sector as well as in the defence, communication and energy sectors is further recommended to adopt by all sectors both for the state as well as federal governments. In addition to this, the US President Donald Trump issues an order which mandates that the federal, as well as state agencies, should adopt the NIST CSF in 2017 May.
The purpose of cybersecurity programs is to protect the data and information of agencies or large organization as well as individuals. The cybersecurity has been given uttermost priority and importance because it protects the data and information assets from the attackers without which the attackers can damage and ruin an organization or individuals in handed over to wrong hands. Almost government, non-government and corporate organizations including medical, banking, education etc. hold personal and confidential information. A weak security system can land in the risk of loss in terms of money, reputation, total erasing of data, theft of data, fraudulence activities.
The cybersecurity further assists in preventing data breaches and ransomware attacks and identify data theft along with aiding risk management of cyber threats. In this context, when an institution or agency has worked out a strong and effective cyber attack response plan, the organization is considered capable of preventing as well as mitigating cyberattacks. The cyber attacks may occur in many forms including malware, ransomware, social engineering, phishing etc. Similarly, the threat vector is a way or path through which a hacker can get access to a network server or to a computer eventually to deliver a disturbance or malicious outcome.