Cyber ​​Security or Cyber ​​Security: Definition, Types, and Threats

Keamanan Siber

Lately, you must be very familiar with the term cyber security or Cyber ​​Security. This problem arose because there was one hacker who ransacked the Indonesian state security system and sold his data on a darkweb forum. Many say that our country’s cyber security is not very competent. But, do you know how complex cyber security really is?

Before reading further, for those of you who want to know more about Netdata, you can contact us directly via the link below.

Consultation Via Whatsapp

Okay, let’s first discuss what is called cyber security, types, and what are the threats that are cyber attacks that are very common and are of particular concern in order to prevent them.

Cyber ​​Security Explanation

Cyber ​​security or cyber security is a technique for protecting systems connected to the internet such as computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks known as cyber security.

We can divide cybersecurity into two parts one is cyber, and the other is security or security.

Cyber ​​refers to technology that includes systems, networks, programs and data. And security deals with the protection of systems, networks, applications, and information. In some cases, it is also called electronic information security or information technology security.

Types of Cybersecurity Types

In the world of cybersecurity, there are several types of cybersecurity. These types may exist again if there are more technological developments. But for now, there are three types of cyber security that are known, including:

Cloud Security

This involves protecting information stored in digital environments or cloud architectures for organizations. It uses various cloud service providers such as AWS, Azure, Google, etc., to ensure security against various threats.

Network Security

This involves implementing hardware and software to secure computer networks against unauthorized access, intruders, attacks, tampering, and misuse. This security helps the organization to protect its assets from external and internal threats.

Application Security

This involves protecting software and devices from unwanted threats. This protection can be done by continuously updating applications to ensure they are safe from attacks. Successful security begins at the design stage, writing source code, validating, threat modeling, etc., before a program or device is deployed.

Types of Cyber ​​Attacks

In a cyber attack, there are several areas of particular concern. This cyber attack does have a variety of special handling and its own security system.

What are the known cyber attacks so far?


The most common and most frequently encountered is malware. Malware means malicious software, which is the most common cyber-attack tool. These are used by cyber criminals or hackers to disrupt or damage legitimate users’ systems.


Ransomware is malware created by hackers. It is a piece of software that encrypts files and user data on the device, making them unusable or undeletable. Later, ransom money is demanded by the criminals for decryption.

It would be impossible or even difficult to restore files that have been affected by ransomware. The only options are to reinstall your hard drive or not use it at all. Even if you want to restore encrypted files, the costs incurred are quite expensive.


Phishing is a cyber crime in which a target or targets are contacted via email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, credit card and banking details and passwords.

That information is then used to access important accounts and can result in identity theft and financial loss.

Denial of Service (DDoS)

And the last one is DDoS. It is a type of cyber threat or malicious endeavor in which cybercriminals interfere with a targeted server, service, or regular network traffic by fulfilling legitimate requests to the target or surrounding infrastructure with Internet traffic.

Here requests come from multiple IP addresses which can render systems unusable, overload their servers, slow them down significantly or temporarily take them offline, or prevent an organization from performing its vital functions.

NetData is a company that provides technology-based services with the best service and quality, if you are interested in us you can contact us directly via this link or via our contact form here.


Leave a Reply

Your email address will not be published. Required fields are marked *

Semua operasional PT. Network Data Sistem akan menggunakan domain per tanggal 8 Mei 2019. Semua informasi/promosi dalam bentuk apapun selain menggunakan domain bukan tanggung jawab PT. Network Data Sistem Dismiss