What Is Cybersecurity?
What Is Cybersecurity?
What Is Cybersecurity?
Cybersecurity is the practice of protecting networks, systems, hardware and data from digital
attacks. Our guide will bring you up-to-speed on the field of cybersecurity, including types of
cyber attacks and it's growing global importance in a digital world.
What Is Cybersecurity?
Cybersecurity is the practice of securing networks,
systems and any other digital infrastructure from malicious
attacks. With cybercrime damages projected to exceed a
staggering $6 trillion by 2021, it’s no wonder banks, tech
companies, hospitals, government agencies and just
about every other sector are investing in cybersecurity
infrastructure to protect their business practices and the
millions of customers that trust them with their data.
What’s the best cybersecurity strategy? A strong security infrastructure includes multiple layers
of protection dispersed throughout a company’s computers, programs and networks. With cyber
attacks occurring every 14 seconds, firewalls, antivirus software, anti-spyware software and
password management tools must all work in harmony to outwit surprisingly creative
cybercriminals. With so much at stake, it’s not hyperbolic to think that cybersecurity tools and
experts act as the last line of defense between our most vital information and digital chaos.
For an effective cyber security, an organization needs to coordinate its efforts throughout its
entire information system. Elements of cyber encompass all of the following:
• Network security
• Application security
• Endpoint security
• Data security
• Identity management
• Database and infrastructure security
• Cloud security
• Mobile security
• Disaster recovery/business continuity planning
• End-user education
The most difficult challenge in cyber security is the ever-evolving nature of security risks
themselves. Traditionally, organizations and the government have focused most of their cyber
security resources on perimeter security to protect only their most crucial system components
and defend against known treats. Today, this approach is insufficient, as the threats advance
and change more quickly than organizations can keep up with. As a result, advisory
organizations promote more proactive and adaptive approaches to cyber security. Similarly, the
National Institute of Standards and Technology (NIST) issued guidelines in its risk
assessment framework that recommend a shift toward continuous monitoring and real-time
assessments, a data-focused approach to security as opposed to the traditional perimeter-based
model.
prioritizing cyber security management across all business practices. NCSA advises
that companies must be prepared to “respond to the inevitable cyber incident, restore normal
operations, and ensure that company assets and the company’s reputation are protected.”
NCSA’s guidelines for conducting cyber risk assessments focus on three key areas: identifying
your organization’s “crown jewels,” or your most valuable information requiring protection;
identifying the threats and risks facing that information; and outlining the damage your
organization would incur should that data be lost or wrongfully exposed. Cyber risk assessments
should also consider any regulations that impact the way your company collects, stores, and
secures data, such as PCI-DSS, HIPAA, SOX, FISMA, and others. Following a cyber risk
assessment, develop and implement a plan to mitigate cyber risk, protect the “crown jewels”
outlined in your assessment, and effectively detect and respond to security incidents. This plan
should encompass both the processes and technologies required to build a mature cyber
security program. An ever-evolving field, cyber security best practices must evolve to
accommodate the increasingly sophisticated attacks carried out by attackers. Combining sound
cyber security measures with an educated and security-minded employee base provides the
best defense against cyber criminals attempting to gain access to your company’s sensitive data.
While it may seem like a daunting task, start small and focus on your most sensitive data, scaling
your efforts as your cyber program matures.
TYPES OF CYBER ATTACKS
Cyber attacks come in all shapes and sizes. Some may be overt
ransomware attacks (hijacking important business products or tools
in exchange for money to release them), while some are covert
operations by which criminals infiltrate a system to gain valuable
data only to be discovered months after-the-fact, if at all. Criminals
are getting craftier with their malicious deeds and here are some of
the basic types of cyber attacks affecting thousands of people each day.
Malware
Malware is used to describe malicious software, including spyware, ransomware and viruses. It
usually breaches networks through a vulnerability, like clicking on suspicious email links or
installing a risky application. Once inside a network, malware can obtain sensitive information,
further produce more harmful software throughout the system and can even block access to vital
business network components (ransomware).
Phishing
Social Engineering
Social engineering is the process of psychologically manipulating people into divulging personal
information. Phishing is a form of social engineering, where criminals take advantage of people’s
natural curiosity or trust. An example of more advanced social engineering is with voice
manipulation. In this case, cyber criminals take an individual’s voice (from sources like a
voicemail or social media post) and manipulate it to call friends or relatives and ask for credit
card or other personal information.
Man-in-the-Middle Attack
Man-in-the-Middle (MitM) attacks occur when criminals interrupt the traffic between a two-party
transaction. For example, criminals can insert themselves between a public Wi-Fi and an
individual’s device. Without a protected Wi-Fi connection, cyber criminals can sometimes view
all of a victim’s information without ever being caught.
Zero-day attack
Zero-day attacks are becoming more-and-more common. Essentially, these attacks occur
between a network vulnerability announcement and a patch solution. In the name of
transparency and security, most companies will announce that they found a problem with their
network safety, but some criminals will take this opportunity to unleash attacks before the
company can come up with a security patch.
BASIC PROTECTION
Cybersecurity Basics
AI FOR CYBERSECURITY
Mobile Security
Mobile phones are one of the most at-risk devices for cyber attacks and the threat is only
growing. Device loss is the top concern among cybersecurity experts. Leaving our phones at a
restaurant or in the back of a rideshare can prove dangerous. Luckily, there are tools that lock
all use of mobile phones (or enact multi-factor passwords) if this incident occurs. Application
security is also becoming another major issue. To combat mobile apps that request too many
privileges, introduce Trojan viruses or leak personal information, experts turn to cybersecurity
tools that will alert or altogether block suspicious activity.
Browser security is the application of protecting internet-connected, networked data from privacy
breaches or malware. Anti-virus browser tools include pop-up blockers, which simply alert or
block spammy, suspicious links and advertisements. More advanced tactics include two-factor
authentication, using security-focused browser plug-ins and using encrypted browsers.
Wi-Fi Security
Using public Wi-Fi can leave you vulnerable to a variety of man-in-the-middle cyber attacks. To
secure against these attacks, most cybersecurity experts suggest using the most up-to-date
software and to avoid password-protected sites that contain personal information (banking,
social media, email, etc.). Arguably, the most secure way to guard against a cyber attack on
Machine learning has become a vital technology for cybersecurity. Machine learning preemptively
stamps out cyber threats and bolsters security infrastructure through pattern detection, real-time
cyber crime mapping and thorough penetration testing.
public Wi-Fi is to use a virtual private network (VPN). VPNs create a secure network, where all
data sent over a Wi-Fi connection is encrypted.
I S M AC HI N E L EA R NI NG E NO U G H T O ST O P CY B E RC RI ME ?
Machine learning does some things really well, such as quickly scanning large amounts of data
and analyzing it using statistics. Cybersecurity systems generate reams of data, so it's no
wonder the technology is such a useful tool.
“We have more and more data available, and the data is generally telling a story,” Raffael Marty,
chief research and intelligence officer at cybersecurity firm Forcepoint says. “If you understand
how to analyze the data, you should be able to come up with the deviations from the norm.”
And those deviations sometimes reveal threats. Thanks to that important function, the use of
machine learning is surging in multiple sectors. It's employed for tasks that require image
recognition and speech recognition. It has even defeated the world's top Go player at his own
game.
But while it has improved cybersecurity, Marty says, humans are still crucial.
“There's this promise that you can just look at past data to predict the future—forgetting that
domain expertise is really important in this equation,” he says. “There are groups of people who
think you can learn everything from the data, but that's simply not true.”
While ethical hacker types had begun to emerge (the New York Times wrote about some
“mischievous but perversely positive” ones in 1981), they were still viewed as anomalies and
outlaws of a sort.
Now, nearly a decade later, as cybercrime costs companies billions of dollars and is predicted
to exceed $6 trillion worldwide by 2021 (the worst cyber attack in history, a particularly nasty
strain of malware dubbed NotPetya, cost FedEx alone at least $300 million), ethical hacking is
catching on in a bigger way than ever before. Within two years, U.S. companies are expected to
spend $1 trillion annually on proactive cybersecurity procedures to safeguard their valuable data.
GLOSARIO
ENGLISH MEANING