Close Menu
    Facebook LinkedIn YouTube Instagram X (Twitter)
    Blue Tech Wave Media
    Facebook LinkedIn YouTube Instagram X (Twitter)
    • Home
    • Leadership Alliance
    • Exclusives
    • Internet Governance
      • Regulation
      • Governance Bodies
      • Emerging Tech
    • IT Infrastructure
      • Networking
      • Cloud
      • Data Centres
    • Company Stories
      • Profiles
      • Startups
      • Tech Titans
      • Partner Content
    • Others
      • Fintech
        • Blockchain
        • Payments
        • Regulation
      • Tech Trends
        • AI
        • AR/VR
        • IoT
      • Video / Podcast
    Blue Tech Wave Media
    Home » 5 common types of cyber security
    blog-cyber-security
    blog-cyber-security
    IT Infrastructure

    5 common types of cyber security

    By Ashley WangJuly 19, 2024No Comments4 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email
    • Cybersecurity is the practice of using technologies, controls, and processes to protect digital networks, devices, and data from unauthorized access.
    • By integrating these types of cyber security, organisations can better protect their digital assets from a wide range of cyber threats, ensuring a more secure digital future.

    Cyber security is a main part of contemporary technology designed to protect networks, devices, and data from cyber threats. Understanding the various types of cyber security is crucial for building a comprehensive defence strategy, ensuring a more secure digital future.

    5 types of cyber security

    1. Network security

    Network security is the practice of protecting a computer network from intruders, whether they are targeted attackers or opportunistic malware. It involves implementing policies and procedures to prevent and monitor unauthorised access, misuse, modification, etc.

    Network security measures include firewalls, anti-virus and anti-malware software, and virtual private networks (VPNs). Firewalls act as a barrier between a trusted network and untrusted networks. They filter traffic based on predetermined security rules. Anti-virus and anti-malware programs detect and eliminate malicious software that can compromise network integrity. VPNs encrypt data transmitted over networks, ensuring that sensitive information remains secure from prying eyes.

    Also read: Computer security vs. information security: What’s the difference?

    2. Information security

    Information security, often referred to as InfoSec, focuses on protecting the integrity, confidentiality, and availability of data. It aims to prevent unauthorised access, use, disclosure, or destruction of information. It encompasses a broad range of practices, like encryption, access control.

    To be specific, encryption converts data into a coded format, making it unreadable without the proper decryption key. Access control restricts access to data based on user roles and permissions, ensuring that only authorised personnel can view or modify sensitive information.

    3. Application security

    With the rise of web and mobile applications, securing these platforms has become increasingly important. Application security involves measures taken to improve the security of an application at the development stage and throughout its lifecycle. It aims to prevent security vulnerabilities within applications, such as SQL injection, cross-site scripting (XSS), and other common attacks.

    Developers employ various techniques to secure applications, e.g., code reviews, penetration testing, and the use of security frameworks. Code reviews involve examining the application’s source code for vulnerabilities. Penetration testing simulates attacks to identify weaknesses. Security frameworks provide a structured approach to implementing security controls within an application.

    Also read: Fiber vs. microwave backhaul: A comprehensive comparison

    4. Cloud security

    Cloud security is a subset of cyber security focused on protecting data, applications, and services hosted in cloud environments. As more organisations move to the cloud, the platform security has become paramount. Cloud security addresses the unique challenges posed by cloud computing, such as data breaches, account hijacking, and insecure interfaces.

    Key cloud security practices include data encryption, identity and access management (IAM), and regular security audits. Data encryption ensures that information stored in the cloud remains secure. IAM controls who can access cloud resources and what actions they can perform. Regular security audits help identify and mitigate potential vulnerabilities in the cloud infrastructure.

    5. Endpoint security

    Focusing on securing endpoints, or end-user devices, such as desktops, laptops, and mobile devices, all of which serve as entry points for cyber attackers, endpoint security aims to protect these devices from threats. Through this type of cyber security, the endpoints will not become a gateway for attacks on the broader network.

    Endpoint security solutions include anti-virus software, endpoint detection and response (EDR) tools, and mobile device management (MDM) systems. Anti-virus software protects against malware, while EDR tools provide real-time monitoring and threat detection. MDM systems manage and secure mobile devices, enforcing security policies and protecting sensitive data.

    Cloud Security cyber security network
    Ashley Wang

    Ashley Wang is an intern reporter at Blue Tech Wave specialising in artificial intelligence. She graduated from Zhejiang Gongshang University. Send tips to a.wang@btw.media.

    Related Posts

    Australia’s regulator gives final nod to Vocus–TPG fibre deal

    July 8, 2025

    Trump Media launches Truth+ streaming with Newsmax

    July 8, 2025

    Vocus secures government greenlight for $3.4B TPG telecom deal

    July 8, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    CATEGORIES
    Archives
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023

    Blue Tech Wave (BTW.Media) is a future-facing tech media brand delivering sharp insights, trendspotting, and bold storytelling across digital, social, and video. We translate complexity into clarity—so you’re always ahead of the curve.

    BTW
    • About BTW
    • Contact Us
    • Join Our Team
    TERMS
    • Privacy Policy
    • Cookie Policy
    • Terms of Use
    Facebook X (Twitter) Instagram YouTube LinkedIn

    Type above and press Enter to search. Press Esc to cancel.