Understanding Cyber Security

10개월 전


Understanding Cyber Security

A brief definition of cybersecurity.
The techniques which protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.

The main objectives of cybersecurity
Availability of Data - Systems, Information and data should be available to the authorized people all the time/when needed.
Reliability of Data - Systems should process and generate Information that should be trustworthy - Information integrity should be maintained.
Protection of Data - Systems, information and data should be protected to unauthorized access or attacks that are aimed for exploitation.

Rogue software
Rogue software: Small, sneaky programs that invade computers and spread quickly and silently with the intent of stealing or damaging your data and information.

Cyber Attack Types

  • Internal attack: An attack on the network or the computer system by some person with authorized system access is known as an insider attack. It is generally performed by dissatisfied or unhappy inside employees or contractors. Because the person is authorized he/she can steal, erase or damage the data. For example, a malicious person erases the data from the last job and you need them to continue. if there is no protection and there are multiple people who are working on that project it would be a chaos. The internal attack could be prevented by planning and installing Internal intrusion detection systems (IDS) in the organization.

  • External Attack: When the attacker is outside of the organization, it is known as an external attack. The organization which is a victim of a cyber attack can face financial, data loss and also the loss of reputation. Since the attacker is external to the organization, so these attackers usually scan and gathering information. For example, the outsider malicious person injects a virus to the network which sends important data to that person continuously. This data could be very important for your organization. An experienced network/security administrator keeps a regular eye on the log generated by the firewalls as external attacks can be traced out by carefully analysing these firewall logs. Also, Intrusion Detection Systems(IDS) need to installed to keep an eye on external attacks.
    Both situations if you have backup your data at least you can prevent some damage.

Some of the reasons for cyber-attacks and the consequences they carry for the victim.

  • Money: People are motivated towards committing the cybercrime is to make quick and easy money.

the victim could have financial loses

  • Revenge: Some people try to take revenge with other people/organization/society/ caste or religion by defaming their reputation or bringing economic or physical loss. This comes under the category of cyber terrorism.

the victim could have financial, reputational or physical loses.

  • Fun: The amateur does cybercrime for fun. They just want to test the latest tool they have encountered.

the victim could have data and physical loses.

  • Recognition: It is considered to be pride if someone hacks the highly secured networks like defence sites or networks.

the victim could have financial, reputational or physical loses.

  • Cyber Espionage: At times the government itself is involved in cyber trespassing to keep eye on other people/network/country. The reason could be politically, economically socially motivated.

the victim could have financial, reputational or physical loses.

  • Anonymity- The anonymity that cyberspace provides motivates the person to commit cybercrime as it is much easy to commit a cybercrime over the cyberspace and remain anonymous as compared to the real world. It is much easier to get away with criminal activity in a cyber world than in the real world. There is a strong sense of anonymity that can draw otherwise respectable citizens to abandon their ethics in pursuit of personal gain.


How to prevent Cyber Attackers

The best way to minimize security risks is to use common sense.

  • If someone can persuade you to run his program on your computer, it’s not your computer anymore.
  • If someone can alter the operating system on your computer, it’s not your computer anymore.
  • If someone has unrestricted physical access to your computer, it’s not your computer anymore.
  • If you allow someone to upload programs to your website, it’s not your website anymore.
  • Weak passwords can defeat strong security.
  • A computer is only as secure as its owner/user is trustworthy.
  • Encrypted data is only as secure as the decryption key.
  • An out-of-date virus scanner is only marginally better than none at all.
  • Absolute anonymity isn’t practical, in real life or on the Web.
  • Technology is not a panacea.
Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  trending

Congratulations! This post has been upvoted from the communal account, @minnowsupport, by zoltarian from the Minnow Support Project. It's a witness project run by aggroed, ausbitbank, teamsteem, someguy123, neoxian, followbtcnews, and netuoso. The goal is to help Steemit grow by supporting Minnows. Please find us at the Peace, Abundance, and Liberty Network (PALnet) Discord Channel. It's a completely public and open space to all members of the Steemit community who voluntarily choose to be there.

If you would like to delegate to the Minnow Support Project you can do so by clicking on the following links: 50SP, 100SP, 250SP, 500SP, 1000SP, 5000SP.
Be sure to leave at least 50SP undelegated on your account.