{"id":127,"date":"2022-09-16T17:48:37","date_gmt":"2022-09-16T17:48:37","guid":{"rendered":"https:\/\/fastwpdemo.com\/newwp\/finbank\/?p=127"},"modified":"2023-10-02T16:52:41","modified_gmt":"2023-10-02T13:52:41","slug":"siber-guvenlik-nedir","status":"publish","type":"post","link":"https:\/\/www.panterteknoloji.com\/en\/siber-guvenlik-nedir\/","title":{"rendered":"What is Cyber Security?"},"content":{"rendered":"<div class=\"blog-details-quote-box\">\n<div class=\"icon\"><\/div>\n<div class=\"text\">\n<div id=\"page-header\" class=\"RepoHeader_pageHeader__grp7r\">\n<div class=\"RepoHeader_container__9RLTe RepoHeader_isArticle__1tOXr\">\n<div class=\"PageHeadline_headline__1oeY3 PageHeadline_isArticle__Zkztp\">\n<div class=\"PageHeadline_titles__ffmTR\">\n<h1 class=\"PageHeadline_title__7fV_Z\">What is Cyber Security?<\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"RepositoryArticle_container__3fiSf\">\n<div class=\"RepositoryArticle_host__ttDWM\">\n<div class=\"RepositoryArticle_content__atmEA\">\n<div class=\"RepositoryArticle_articleContent__D0YRA\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>Cyber security; It is the practice of protecting computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. Also known as information technology security or electronic information security. The term applies in a variety of contexts, from businesses to mobile computing, and can be divided into several common categories.<\/p>\n<ul>\n<li><strong>network security<\/strong>is the practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.<\/li>\n<li><strong>Application security<\/strong>focuses on ensuring that software and devices are not affected by threats. A compromised application can gain access to data it is designed to protect. Successful security begins before a program or device is deployed, even in the design phase.<\/li>\n<li><strong>Information security<\/strong>protects the integrity and confidentiality of data both during storage and transfer.<\/li>\n<li><strong>operational security<\/strong>includes processes and decisions regarding the processing and protection of data assets. This includes the permissions users have when accessing a network and the procedures that determine how and where data can be stored or shared.<\/li>\n<li><strong>Disaster recovery and business continuity<\/strong>describes how an organization responds to a cybersecurity incident or other event that results in loss of transactions or data. Disaster recovery policies determine how the organization restores its processes and information to return to the same operating capacity as before the event. Business continuity is the plan that the organization falls back on when trying to operate without certain resources.<\/li>\n<li><strong>End user training<\/strong>, addresses the most unpredictable cybersecurity factor: people. Anyone who does not follow good security practices can accidentally infect another secure system. Teaching users to delete suspicious email attachments, not to insert unidentified USB drives, and various other important lessons is vital to the security of any organization.<\/li>\n<\/ul>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>What is Cyber Security? Cyber security; It is the practice of protecting computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. Also known as information technology security or electronic information security. The term applies in a variety of contexts, from businesses to mobile computing, and can be divided into several common categories. Whether it is network security, targeted attackers or opportunistic malware [\u2026]<\/p>","protected":false},"author":1,"featured_media":2088,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diger"],"_links":{"self":[{"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/posts\/127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":0,"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/posts\/127\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/media\/2088"}],"wp:attachment":[{"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/media?parent=127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/categories?post=127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panterteknoloji.com\/en\/wp-json\/wp\/v2\/tags?post=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}