what is cybersecurity?

Cybersecurity is the practice of protecting computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. It is also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

  • Network security is the practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
  • Application security focuses on keeping software and devices free from threats. A compromised application can grant access to the data you want to protect. Successful security begins in the design phase, long before a program or device is deployed.
  • Information security protects the integrity and privacy of data both in storage and in transit.
  • operational security encompasses the processes and decisions for handling and protecting data resources. The permissions users have when accessing a network and the procedures that determine how and where data can be stored or shared all fall under this umbrella.
  • Disaster recovery and business continuity define how an organization responds to a cybersecurity incident or other event that causes the loss of operations or data. Disaster recovery policies define how the organization will recover your operations and information to return to the same operational capacity as before the event. Business continuity is the plan the organization falls back on when trying to operate without certain resources.
  • End-user training addresses the most unpredictable cybersecurity factor: people. Anyone can accidentally introduce a virus into an otherwise secure system by not following good security practices. Teaching users to delete suspicious email attachments, plug in unidentified USB drives, and a few other important lessons is critical to an organization’s security.

The scale of the cyber threat
The Global cyber Threat is evolving rapidly with an increasing number of data breaches each year. A report from Riskbase Security found that a shocking 7.9 billion records were exposed through data breaches in the first nine months of 2019 alone. This number is more than double (112%) the number of records released during the same period in 2018.

Medical services, retailers, and public institutions recorded the most breaches, with malicious criminals responsible for the majority of incidents. Some of these sectors are more attractive to cybercriminals because you collect financial and medical data, but all businesses that use networks can target customer data, corporate espionage or customer attacks.

As the cyber threat continues to grow, the International Data Corporation predicts that global spending on cybersecurity solutions will reach a massive $133.7 billion by 2022. Governments around the world have responded to the rising cyber threat with guidance to help organizations implement effective cybersecurity practices.

In the U.S., the National Institute of Standards and Technology (NIST) has a cybersecurity framework. To combat malicious code proliferation and support early detection, the framework recommends continuous, real-time monitoring of all electronic resources.

The importance of system monitoring is reflected in the “10 steps to cybersecurity” provided by the UK government’s National Cyber Security Centre. In Australia, the Australian Cyber Security Centre (ACSC) regularly publishes guidance on how organizations can counter the latest cybersecurity threats.

Types of cyber threats
The threats that cybersecurity counters are threefold:

  1. cybercrime involves individual actors or groups targeting systems for financial gain or to cause disruption.
  2. cyberattacks are often about politically motivated information gathering.
  3. cyberterrorism is intended to subvert electronic systems to cause panic or fear.

How do malicious actors gain control of computer systems? Here are some common methods used to threaten cybersecurity:

Malware
Malware means harmful software. One of the most common cyber threats, malware is software created by a cybercriminal or hacker to disrupt or damage a legitimate user’s computer. Malware is often spread via an unwanted email attachment or a legitimate-looking download and can be used by cyber criminals to make money or in politically motivated cyber attacks.

There are a number of different types of malware, including:

  • Virus: a self-replicating program that attaches itself to clean files and spreads across a computer system, infecting files with malicious code.
  • Trojan: a type of malware disguised as legitimate software. Cybercriminals trick users into uploading Trojans to your computer, where they cause damage or collect data.
  • Spyware: a program that secretly records what a user does so cybercriminals can use that information. For example, spyware can capture credit card data.
  • Ransomware: malware that locks a user’s files and data, with the threat of deleting you unless a ransom is paid.
  • Adware: advertising software that can be used to spread malware.
  • Botnets: networks of malware-infected computers that cybercriminals use to perform tasks online without the user’s permission.

SQL injection
An SQL (structured language query) injection is a type of cyber attack used to control and steal data from a database. Cybercriminals exploit vulnerabilities in data-driven applications to inject malicious code into a database via a malicious SQL statement. This gives them access to confidential information in the database.

Phishing
Phishing is when cybercriminals target victims with emails that appear to be from a legitimate company asking for confidential information. Phishing attacks are commonly used to trick people into handing over credit card details and other personal information.

Man-in-the-middle attack
A man-in-the-middle attack is a type of cyber threat in which a cybercriminal intercepts communications between two people to steal data. For example, on an insecure Wi-Fi network, an attacker may intercept data transmitted from the victim’s device and the network.

Denial-of-service attack
In a denial-of-service attack, cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming networks and servers with traffic. This renders the system unusable and prevents an organization from performing critical functions.

Latest cyber threats
What are the latest cyber threats that individuals and organizations need to protect against? Here are some of the latest cyber threats reported by the UK, US AMERICAN and Australian governments.

Dridex malware
In December 2019, the U.S. Department of Justice (DoJ) indicted the leader of an organized cybercriminal group for your part in a global dridex malware attack. This malicious campaign affected the public, government, infrastructure, and businesses worldwide.

Dridex is a financial Trojan with a number of features. Affected by victims since 2014, it infects computers with phishing emails or existing malware. Able to steal passwords, banking information and personal data that can be used in fraudulent transactions, it has caused massive financial losses amounting to hundreds of millions.

In response to the dridex attacks, THE United KINGDOM National Cyber Security Centre advises the public to “ensure devices are patched, antivirus programs are enabled and up-to-date, and files are backed up.”

Romance scam
In February 2020, the FBI warned U.S. citizens to be aware of the trust cybercriminals commit with dating sites, chat rooms and apps. Perpetrators take advantage of people seeking new partners and lure victims into revealing personal information.

The FBI reports that cyber threats affected 114 victims in New Mexico in 2019 with financial losses of $1.6 million.

Emotet malware
In late 2019, the Australian Cybersecurity Centre warned national organizations of a widespread global cyberthreat through Emotet malware.

Emotet is a sophisticated Trojan that can steal data and also load other malware. Emotet thrives on a simple password: a reminder of the importance of creating a strong password to protect against cyber threats.

End user protection
End-user protection or endpoint security is a Critical aspect of cybersecurity. After all, it is often one person (the end user) who inadvertently uploads malware or another form of cyber threat to your desktop, laptop or mobile device.

How do cybersecurity measures protect end users and systems? First, cybersecurity relies on cryptographic protocols to encrypt emails, files and other critical data. This not only protects information in transit, but also protects against loss or theft.

In addition, end-user security software scans computers for malicious code, quarantines that code, and then removes it from the computer. Security programs can even detect and remove malicious code hidden in the primary boot record and are designed to encrypt or erase data from the computer’s hard drive.

Electronic security protocols also focus on detecting malware in real time. Many use heuristic and behavioral analysis to monitor the behavior of a program and its code to defend against viruses or Trojans that change their form with each execution (polymorphic and metamorphic malware). Security programs can confine potentially malicious programs to a virtual bubble, separate from a user’s network, to analyze its behavior and learn how to better detect new infections.

Security programs continue to develop new defenses as cybersecurity experts identify new threats and new ways to combat them. To get the most out of end-user security software, employees need to be educated about how you use it. Crucially, it must be run and updated regularly to protect users from the latest cyber threats.

Cybersecurity tips-protect yourself from cyberattacks.
How can businesses and individuals protect themselves from cyber threats? Here are our top cyber security tips:

  1. update your software and operating system: this means you’ll benefit from the latest security patches.
  2. use antivirus software: security solutions like Kaspersky Total Security detect and remove threats. Keep your software updated for the best protection.
  3. use strong passwords: make sure your passwords are not easy to guess.
  4. do not open email attachments from unknown senders: These could be infected with malware.
  5. do not click on links in emails from unknown senders or unknown websites:this is a common way malware is spread.
  6. avoid using insecure Wi-Fi networks in public places: insecure networks make you vulnerable to man-in-the-middle attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *