Network Security:
Protects The Integrity,
Confidentiality, And Availability Of
Data Flowing Across Or Within A
Network.
Examples: Firewalls, Intrusion Detection/Prevention Systems (IDS/IPS), Virtual Private Networks (Vpns), Network Access Control (NAC)
Threats It Handles: Unauthorized Access, Ddos Attacks, Man-in-the-middle (Mitm) Attacks
Information Security:
Safeguards Data-whether
It’s Stored, Transmitted, Or
Processed-from Unauthorized
Access Or Disclosure.
Examples: Encryption, Data Masking, Access Controls, Secure File Storage
Threats It Handles: Data Breaches, Insider Threats, Data Tampering
Endpoint Security:
Secures Devices (Endpoints) Like Desktops, Laptops, Mobile Phones, And Tablets
Connected To A Network.
Examples: Antivirus/Anti-malware Software, Endpoint Detection And Response
(EDR), Device Encryption
Threats It Handles: Malware Infections, Unauthorized Device Access, Physical Device Theft
Application Security:
Ensures That Software And Applications Are Secure From Threats At Every Stage Of Development And Deployment.
Examples:
Secure Coding Practices, Web Application Firewalls (WAF), Penetration Testing, Code Reviews And Static Code
Analysis
Threats It Handles: SQL Injection, Cross-site Scripting (XSS), Buffer Overflow Attacks
Cloud Security:
Protects Data, Applications, And Infrastructures Involved In Cloud Computing.
Examples: Cloud Access Security Brokers
(CASB), Identity And Access Management
(IAM), Encryption And Key Management
In The Cloud
Threats It Handles: Misconfigured Cloud Storage, Data Leakage, Cloud Service Provider
Vulnerabilities
Operational Security:
Involves Policies And Procedures To Protect Sensitive Information During Daily Operations.
Examples: Role-based Access Controls, Secure Workflows, Regular Audits
Threats It Handles: Insider Threats, Process Loopholes, Data Leaks Due To Poor Handling
Mobile Security:
Focuses On Protecting Mobile Devices And The Data They Contain Or Access.
Examples:Mobile Device Management
(MDM), App Sandboxing, Remote Wipe Capabilities
Threats It Handles: Malicious Mobile Apps, Unsecured Wi-fi, Lost Or Stolen Devices
Internet of Things Security:
Secures Connected Smart
Devices And Networks In The
Internet Of Things Ecosystem.
Examples: Network Segmentation, Firmware Updates, Strong Device Authentication
Threats It Handles: Botnets (Like Mirai), Device Hijacking, Unauthorized Data Collection