Cyber security isn't confined to a single architecture; instead, it's based on hierarchical layers to guarantee strong security. Following are the seven layers of cyber security:
This layer deals with the human behavior towards the system and how they protect the system's data. To increase security in this layer, humans should be completely aware of the harm that threats can pose to the system. They should have sound security practices, such as using strong passwords, detecting phishing attempts, and tackling threats if the system is breached. Concisely, this layer incorporates the management controls of the users.
This is the exchange point where other devices or networks retrieve and access all the data. This includes all the devices connected to a particular network. It ensures that both the physical and digital security mechanisms protect the system, mainly implemented using
This is the layer where all the related security features are placed to protect the network from unauthorized access. Restricted access is given to the user so that if there is some attack, it is not fatal for the whole network and is restricted to only that network domain.
This layer controls access to an application, that application's access to the system's data, and its security. To guarantee security at this layer, applications should install their latest version to be as secure as possible (new versions have minor bugs fixed if present).
This layer ensures that the threats do not exploit the endpoints (the devices). An example is installing antivirus software to protect mobile devices, desktops, and laptops. This layer can either be implemented on the network or cloud, depending on the requirement of the system. Endpoint encryption is the basis of security on this layer, ensuring that devices run in a secure environment.
This layer is where security mechanisms are implemented to protect data transfer and storage. Backup security measures can be used to prevent the loss of data. For example, disk encryption and two-factor authentication protect the transfer of data and archiving for storage.
This is the data (user credentials, personal and critical information) that is most critical to protect for which all the security measures are maintained and designed. Users can have regular backups and recovery plans to secure their data.
Free Resources