Computer security, also known as cybersecurity or IT security, is security applied to computing devices such as computers and smartphones, as well as to both private and public computer networks, including the whole Internet. The field includes all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance due to the increasing reliance of computer systems in most societies. It includes physical security to prevent theft of equipment and information security to protect the data on that equipment. Those terms generally do not refer to physical security, but a common belief among computer security experts is that a physical security breach is one of the worst kinds of security breaches as it generally allows full access to both data and equipment.
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data. Cybersecurity attempts to assure the protection of assets, which includes data, desktops, servers, buildings, and most importantly, humans. The goal of cybersecurity is to protect data both in transit and at rest. Countermeasures can be put in place in order to increase the security of data. Some of these measures include, but are not limited to, access control, awareness training, audit and accountability, risk assessment, penetration testing, vulnerability management, and security assessment and authorization.
Types of proxy–
- Application based
- Browser based
- Web based
- Application based– In application based proxy we work on application software like ultrasurf to applied dummy ure identity.following picture shows the working of ultrasurf
To download this click on this link http://ultrasurf.us/download/u.zip
2. Browser Based proxy– Browser based proxy works in browser like add-ons inbrowser like mozilla firefox and goggle chrome.for example anonymox add on in mozilla is showing below-
3.Web based proxy– web based proxy works on web pages to apply proxy on search via serching engines for example http://www.kproxy.com