Trusted answers to developer questions
Trusted Answers to Developer Questions

Related Tags

cyber security

What are the seven layers of cyber security?

Salman Masood

Cyber security isn't confined to a single architecture; instead, it's based on hierarchical layers to guarantee strong security. Following are the seven layers of cyber security:

Human layer

This layer deals with the human behavior towards the system and how they protect the system's data. To increase security in this layer, humans should be completely aware of the harm that threats can pose to the system. They should have sound security practices, such as using strong passwords, detecting phishing attempts, and tackling threats if the system is breached. Concisely, this layer incorporates the management controls of the users.

Perimeter security layer

This is the exchange point where other devices or networks retrieve and access all the data. This includes all the devices connected to a particular network. It ensures that both the physical and digital security mechanisms protect the system, mainly implemented using firewallsIt is a network system that monitors the incoming and outgoing network traffic., intrusion detection systemsIt is a device or a software that monitors the network for malicious activities., and others.

Network layer

This is the layer where all the related security features are placed to protect the network from unauthorized access. Restricted access is given to the user so that if there is some attack, it is not fatal for the whole network and is restricted to only that network domain.

Application security layer

This layer controls access to an application, that application's access to the system's data, and its security. To guarantee security at this layer, applications should install their latest version to be as secure as possible (new versions have minor bugs fixed if present). 

Endpoint security layer

This layer ensures that the threats do not exploit the endpoints (the devices). An example is installing antivirus software to protect mobile devices, desktops, and laptops. This layer can either be implemented on the network or cloud, depending on the requirement of the system. Endpoint encryption is the basis of security on this layer, ensuring that devices run in a secure environment.

Data security layer

This layer is where security mechanisms are implemented to protect data transfer and storage. Backup security measures can be used to prevent the loss of data. For example, disk encryption and two-factor authentication protect the transfer of data and archiving for storage.

Mission-critical assets

This is the data (user credentials, personal and critical information) that is most critical to protect for which all the security measures are maintained and designed. Users can have regular backups and recovery plans to secure their data.

RELATED TAGS

cyber security

CONTRIBUTOR

Salman Masood
Copyright ©2023 Educative, Inc. All rights reserved
RELATED COURSES

View all Courses

Keep Exploring
Related Courses