MS Office 2200032745

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Cyber tech

A Brief About Cyber Tech

 is a list of cybersecurity information technology. Cybersecurity


is security as it is applied to information technology. This includes all technology that
stores, manipulates, or moves data, such as computers, data networks, and all
devices connected to or included in networks, such as routers and switches. All
information technology devices and facilities need to be secured against intrusion,
unauthorized use, and vandalism. Additionally, the users of information technology
should be protected from theft of assets, extortion, identity theft, loss of privacy
and confidentiality of personal information, malicious mischief, damage to
equipment, business process compromise, and the general activity of cybercriminals.
The public should be protected against acts of cyberterrorism, such as the
compromise or loss of the electric power grid.
Locked info
since the Internet's arrival and with the digital transformation initiated in recent
years, the notion of cybersecurity has become a familiar subject in both our
professional and personal lives. Cybersecurity and cyber threats have been
consistently present for the last 50 years of technological change. In the
1970s and 1980s, computer security was mainly limited to academia until the
conception of the Internet, where, with increased connectivity, computer
viruses and network intrusions began to take off. After the spread of viruses in
the 1990s, the 2000s marked the institutionalization [clarification needed] of cyber
threats and cybersecurity.
The April 1967 session organized by Willis Ware at the Spring Joint Computer
Conference, and the later publication of the Ware Report, we
Failed offensive strategy

The National Security Agency (NSA) is responsible for the protection of


U.S. information systems and also for collecting foreign
intelligence.[12] These two duties are in conflict with each other. Protecting
information systems includes evaluating software, identifying security
flaws, and taking steps to correct the flaws, which is a defensive action.
Collecting intelligence includes exploiting security flaws to extract
information, which is an offensive action. Correcting security flaws makes
the flaws unavailable for NSA exploitation.
The agency analyzes commonly used software in order to find security flaws,
which it reserves for offensive purposes against competitors of the United
States. The agency seldom takes defensive action by reporting the flaws to
software producers so that they can eliminate them.[13]
The offensive strategy worked for a while, but eventually other nations,
including Russia, Iran, North Korea, and China, acquired their own offensive
capability and have tended to use it against the United States. NSA contractors
created and sold "click-and-shoot" attack tools to U.S. agencies and close allies,
but eventually the tools made their way to foreign adversaries. In 2016, NSAs
own hacking tools were hacked, and they have been used by Russia and North
Korea. NSA's employees and contractors have been recruited at high salaries
by adversaries, anxious to compete in cyberwarfare.[13]
Vulnerabilities and attacks
A vulnerability is a weakness in design, implementation, operation, or internal control. Most
of the vulnerabilities that have been discovered are documented in the Common Vulnerabilities
and Exposures (CVE) database.[citation needed] An exploitable vulnerability is one for which at least
one working attack or exploit exists.[14] Vulnerabilities can be researched, reverse-engineered,
hunted, or exploited using automated tools or customized scripts.[15][16] To secure a computer
system, it is important to understand the attacks that can be made against it, and
these threats can typically be classified into one of these categories below:
The End

You might also like