Cyber Security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks.
In a computing context, security comprises Cyber Security and physical security both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.
Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of Cyber Security.
Elements of Cyber Security
- Application security: Application security is the use of software, hardware, and procedural methods to protect applications from external threats.
- Information security: Information security is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Information security responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.
- Network security: Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
- Disaster recovery/business continuity planning: A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event.
- Operational security: OPSEC (operational security) is an analytical process that classifies information assets and determines the controls required to protect these assets.
- End-user education: Not educating your end-users in cybersecurity initiatives is like trying to keep a flood at bay using a screen door. Your end-users are the first line of defense against cybersecurity attacks (like phishing scams).
Types of Cyber Security threats:
The process of keeping up with new technologies, security trends and threat intelligence is a challenging task. However, it's necessary in order to protect information and other assets from cyberthreats, which take many forms.
➢ Ransomware is a type of malware that involves an attacker locking the victim's computer system files typically through encryption and demanding a payment to decrypt and unlock them.
➢ Malware is any file or program used to harm a computer user, such as worms, computer viruses, Trojan horses and spyware.
➢ Social engineering is an attack that relies on human interaction to trick users into breaking security procedures in order to gain sensitive information that is typically protected.
➢ Phishing is a form of fraud where fraudulent emails are sent that resemble emails from reputable sources; however, the intention of these emails is to steal sensitive data, such as credit card or login information.
What Cyber Security can prevent?
The use of Cyber Security can help prevent cyber attacks, data breaches and identity theft and can aid in risk management. When an organization has a strong sense of network security and an effective incident response plan, it is better able to prevent and mitigate these attacks. For example, end user protection defends information and guards against loss or theft while also scanning computers for malicious code.
Challenges in Cybersecurity and trends:
1. Ransomware Evolution
Ransomware is the bane of cybersecurity, IT, data professionals, and executives.
Perhaps nothing is worse than a spreading virus that latches onto customer and business
information that can only be removed if you meet the cybercriminal’s egregious demands. And
usually, those demands land in the hundreds of thousands (if not millions) of dollars.
Ransomware attacks are one of the areas of cybercrime growing the fastest, too. The number of
attacks has risen 36 percent this year.
2. AI Expansion
Robots might be able to help defend against incoming cyber-attacks.
Between 2016 and 2025, businesses will spend almost $2.5 billion on artificial intelligence to
prevent cyberattacks.
3. IoT Threats
The vast majority of humans in first-world countries have an iPhone in their pockets, a computer at
work, a television at home, and a tablet in their cars.
The Internet of Things is making sure that every single device you own is connected. Your
refrigerator can tell you when the milk runs out. Alexa can order you a pizza.
Of course, all of that connection carries with it massive benefits, which is what makes it so appealing
in the first place. You no longer have to log in on multiple devices. You can easily control your TV
with your phone. And you might even be able to control your at-home thermostat from other digital
devices.
The problem is that all of that interconnectedness makes consumers highly susceptible to
cyberattacks. In fact, one study revealed that 70 percent of IoT devices have serious security
vulnerabilities.
Specifically, insecure web interfaces and data transfers, insufficient authentication methods, and a
lack of consumer security knowledge leave users open to attacks.
And that truth is compounded by the fact that so many consumer devices are now interconnected.
In other words, if you access one device, you’ve accessed them all. Evidently, with more convenience
comes more risk.
That’s a risk that security professionals need to be prepared to face by integrating password
requirements, user verification, time-out sessions, two-factor authentication, and other
sophisticated security protocols.
4. Blockchain Revolution
2017 ended with a spectacular rise in the valuation and popularity of crypto currencies like Bitcoin
and Ethereum. These crypto currencies are built upon blockchains, the technical innovation at the
core of the revolution, a decentralized and secure record of transactions.
What does blockchain technology have to do with cybersecurity?
It's a question that security professionals have only just started asking. As 2018 progresses, you'll
likely see more people with answers.
While it's difficult to predict what other developments blockchain systems will offer in regards to
cybersecurity, professionals can make some educated guesses. Companies are targeting a range of
use cases which the blockchain helps enable from medical records management, to decentralized
access control, to identity management. As the application and utility of blockchain in a
cybersecurity context emerges, there will be a healthy tension but also complementary integrations
with traditional, proven, cybersecurity approaches. You will undoubtedly see variations in
approaches between public & private blockchains.
One thing's for sure, though. With blockchain technology, cybersecurity will likely look much
different than it has in the past.
5. Serverless Apps Vulnerability
Serverless apps can invite cyber-attacks.
Customer information is particularly at risk when users access your application off-server or
locally on their device.
No comments:
Post a Comment