We can define cyber security as the protection of the security, integrity and confidentiality of communication between people or organizations in Information Systems, life, integration, material or spiritual assets or even our data in electronic course.
In today's technology age, we have started to reflect and live a large part of our lives in electronic media. Not just us individuals! Governments, public institutions, social platforms, SMEs, and all small and large private companies have started to communicate with consumers or other companies and organizations through their services and products through virtual environments.
Virtual world, cyber world, described by concepts such as this world, virtual and real assets are now produced by the data and our lives are involved. We do most of our communication with other people in electronic media. We have to protect ourselves and our institutions against cyber intruders in all of this virtual life we have mentioned. At this point, we see the definition of “cyber security”.
The word cyber is the name given to networks with infrastructure IT systems. It can usually be defined as virtual reality. In short, cyber security is the protection of the integrity and confidentiality of life on cyber networks, which are Infrastructure Information Systems.
Information security and cyber security are often used interchangeably but different from each other. Information security is defined as the protection of the integrity, security and confidentiality of information, and limits itself to internationally recognized standards such as ISO 27001, ITIL, COBIT. However, the infrastructure is a much wider concept, which includes information security, which is information systems.
When we look at the concept of cyber security from the window of institutions, companies and SMEs, we first come up with the concept of Information Security. “Data / information” comes from the top of the assets owned by the institutions. Institutions can use the information they have to compile, process, sell, rent, or produce a product / value. Many standards have been set up in the global world for information security that is critical to organizations. ISO 2701 is the first and only auditable information security standard in the global scale for organizations. By providing information security, they are obliged to protect their confidential data and their most important assets, “information”.
Otherwise, cybercriminals, malicious hackers, or hacker groups can access this data without permission, causing financial and moral harm to organizations.
Hackers are technically skilled in discovering their weaknesses by looking at well-intentioned products, software and technology from different windows that have proven their expertise on IT systems, which are often described as “hackers” in the computer world. He is a good software (coding) expert and they use technology very well. However, as the written and visual media constantly put malicious hackers to the forefront, the word hacker has gained a bad meaning.