top of page
Search

Cyber Security

  • AD 79
  • Nov 14, 2021
  • 4 min read


Cybersecurity domains

A strong cybersecurity strategy has layers of protection to defend against cybercrime, including cyber-attacks that attempt to access, change, or destroy data; extort money from users or the organization; or aim to disrupt normal business operations. Counter measures should address:


Critical infrastructure security - practices for protecting the computer systems, networks, and other assets that society relies upon for national security, economic health, and/or public safety


Network security - security measures for protecting a computer network from intruders, including both wired and wireless (Wi-Fi) connections.


Application security - processes that help protect applications operating on-premises and in the cloud. Security should be built into applications at the design stage, with considerations for how data is handled, user authentication, etc.


Cloud security - specifically, true confidential computing that encrypts cloud data at rest (in storage), in motion (as it travels to, from and within the cloud) and in use (during processing) to support customer privacy, business requirements and regulatory compliance standards.


Information security - data protection measures, such as the General Data Protection Regulation or GDPR, that secure your most sensitive data from unauthorized access, exposure, or theft.


End-user education - building security awareness across the organization to strengthen endpoint security. For example, users can be trained to delete suspicious email attachments, avoid using unknown USB devices, etc.


Disaster recovery and business continuity planning - tools and procedures for responding to unplanned events, such as natural disasters, power outages, or cybersecurity incidents, with minimal disruption to key operations.


Types of cyber threats

The threats countered by cyber-security are three-fold:

  1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption.

  2. Cyber-attack often involves politically motivated information gathering.

  3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear.


Common cyber threats

Although cybersecurity professionals work hard to close security gaps, attackers are always looking for new ways to escape IT notice, evade defense measures, and exploit emerging weaknesses. The latest cybersecurity threats are putting a new spin on “known” threats, taking advantage of work-from-home environments, remote access tools, and new cloud services. These evolving threats include:



Malware

Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread via an unsolicited email attachment or legitimate-looking download, malware may be used by cybercriminals to make money or in politically motivated cyber-attacks.

There are a number of different types of malwares, including:

  1. Virus: A self-replicating program that attaches itself to clean file and spreads throughout a computer system, infecting files with malicious code.

  2. Trojans: A type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computer where they cause damage or collect data.

  3. Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this information. For example, spyware could capture credit card details.

  4. Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online without the user’s permission.

  5. Adware: Advertising software which can be used to spread malware


Ransomware

Ransomware is a type of malware that locks down files, data or systems, and threatens to erase or destroy the data - or make private or sensitive data to the public - unless a ransom is paid to the cybercriminals who launched the attack. Recent ransomware attacks have targeted state and local governments, which are easier to breach than organizations and under pressure to pay ransoms in order to restore applications and web sites on which citizens rely.


Phishing

Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for sensitive information. Phishing attacks are often used to dupe people into handing over credit card data and other personal information


Insider threats

Current or former employees, business partners, contractors, or anyone who has had access to systems or networks in the past can be considered an insider threat if they abuse their access permissions. Insider threats can be invisible to traditional security solutions like firewalls and intrusion detection systems, which focus on external threats.


Denial-of-service attack

A denial-of-service attack is where cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming the networks and servers with traffic. This renders the system unusable, preventing an organization from carrying out vital functions.


Man-in-the-middle attack

A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts communication between two individuals in order to steal data. For example, on an unsecure WiFi network, an attacker could intercept data being passed from the victim’s device and the network.


Cyber safety tips - protect yourself against cyberattacks
  1. Update your software and operating system: This means you benefit from the latest security patches.

  2. Use anti-virus software: Security solutions like will detect and removes threats. Keep your software updated for the best level of protection.

  3. Use strong passwords: Ensure your passwords are not easily guessable.

  4. Do not open email attachments from unknown senders: These could be infected with malware.

  5. Do not click on links in emails from unknown senders or unfamiliar websites: This is a common way that malware is spread.

  6. Avoid using unsecure WiFi networks in public places: Unsecure networks leave you vulnerable to man-in-the-middle attacks.

 
 
 

Recent Posts

See All

Comments


About Me

AD_edited_edited.jpg

Academical inclined, sport lover, avid reader, artist, stamp collector, melomaniac, wanderlust, inquisitive, righteous, sympathetic, humble and helpful are some of the words that best describe me. 😉

P.S : And now a part-time blogger

Love Science & Tech

Follow me !!

My_Website_QR.png

Thanks for submitting!

© 2021 by Aanthoni D'Souza. Proudly created with Wix.com

bottom of page