Seminar Cyber Security.1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

1.

INTRODUCTION

Cybersecurity is of the utmost importance in an era that thrives on technology.


Cybersecurity protects all internet-connected systems, devices, and services from
malicious cybercriminals.

We live in the digital era. Technology has permeated every part of our lives.
Anything we need, we can find with a swipe of our finger. From advanced
technologies, such as IoT, to the latest technologies, such as ChatGPT, technology
has made our lives far simpler and more convenient. However, this convenience
comes with its potential threats.

Behind every technology we use, there's a potential threat of cyber crimes. The latest
cybercrime statistics are terrifying in that aspect. Cybersecurity Ventures estimates
that the cost of cybercrime globally can reach $10.5 trillion by 2025. This has made
cybersecurity all the more essential.

In this blog, we have discussed everything you need to know about cybersecurity,
what it is, its importance, types, myths, the latest challenges, and domains. We have
also covered the top cybersecurity certifications.
2.WHATS CYBER SECURITY

Cybersecurity is the practice of protecting internet-connected systems such as


hardware, software and data from cyberthreats. It's used by individuals and
enterprises to protect against unauthorized access to data centers and other
computerized systems.

An effective cybersecurity strategy can provide a strong security posture against


malicious attacks designed to access, alter, delete, destroy or extort an organization's
or user's systems and sensitive data. Cybersecurity is also instrumental in preventing
attacks designed to disable or disrupt a system's or device's operations.

An ideal cybersecurity approach should have multiple layers of protection across any
potential access point or attack surface. This includes a protective layer for data,
software, hardware and connected networks. In addition, all employees within an
organization who have access to any of these endpoints should be trained on the
proper compliance and security processes. Organizations also use tools such as
unified threat management systems as another layer of protection against threats.
These tools can detect, isolate and remediate potential threats and notify users if
additional action is needed.

Cyberattacks can disrupt or immobilize their victims through various means, so


creating a strong cybersecurity strategy is an integral part of any organization.
Organizations should also have a disaster recovery plan in place so they can quickly
recover in the event of a successful cyberattack.
3.WHY IS CYBER SECURITY IS IMPORTANT ?

With the number of users, devices and programs in the modern enterprise
increasing along with the amount of data -- much of which is sensitive or
confidential -- cybersecurity is more important than ever. But the volume and
sophistication of cyberattackers and attack techniques compound the problem
even further,
Without a proper cybersecurity strategy in place -- and staff properly trained on
security best practices -- malicious actors can bring an organization's operations
to a screeching halt.

Organizations all across the globe thrive on data. They gather and analyze the data of
millions of users to develop products that meet the customers' needs. And so, even a
single breach can lead to a data breach of millions of people. Most of this data is
sensitive and can cause much damage to users. For example, the Yahoo data breach
in August 2013 impacted the accounts of almost 3 billion people. As such, the
importance of cybersecurity is unparalleled.

Data breaches lead to a loss of trust and faith from customers and a substantial
financial impact on the organization. One may argue that technology is becoming
increasingly sophisticated and can prevent these attacks. However, they forget that
cybercriminals are also becoming more sophisticated and using subtler ways to
attack. Therefore, cybersecurity is imperative. It is at the center of all organizations,
whether small or big. The cybersecurity market is expected to grow to $266 billion by
2027 from $189.9 billion in 2023, making cybersecurity more necessary.
4.WHAT ARE THE ELEMENTS OF CYBER SECURITY AND
HOW DOES IT WORKS?

The cybersecurity field can be broken down into several different sections, the
coordination of which within the organization is crucial to the success of a
cybersecurity program. These sections include the following:

 Application security.

 Information or data security.

 Network security.

 Disaster recovery and business continuity planning.

 Operational security.

 Cloud security.

 Critical infrastructure security.

 Physical security.

 End-user education.

Maintaining cybersecurity in a constantly evolving threat landscape is a challenge for


all organizations. Traditional reactive approaches, in which resources were put
toward protecting systems against the biggest known threats while lesser-known
threats were undefended, are no longer a sufficient tactic. To keep up with changing
security risks, a more proactive and adaptive approach is necessary. Several key
cybersecurity advisory organizations offer guidance. For example, the National
Institute of Standards and Technology (NIST) recommends adopting continuous
monitoring and real-time assessments as part of a risk assessment framework to
defend against known and unknown threats.
4.1.Application Security

Application security involves creating, adding, and testing security features in


applications to prevent cyber attacks and make them secure. It primarily defends
against threats during the app's development stage.

4.2.Information Security

Also called InfoSec, this domain protects all kinds of data from unauthorized access
and prevents any changes, modifications, disclosures, and deletions. It protects
sensitive business information and ensures data security.

4.3.Network Security

This involves protecting computer networks and network-accessible resources from


unauthorized access and modifications. Network security combines strategies,
technologies, and processes that protect a network from intrusion.

4.4.Disaster Recovery or Business Continuity Planning

This refers to developing preventive and recovery systems to manage and respond to
potential cyber threats. It enables an organization to recover from unfortunate
incidents and function quickly.
4.5.Cloud Security

Cloud security protects the cloud infrastructure, environment, applications, and data
from threats. It ensures the authentication of end users and devices and provides data
privacy protection.

4.6.Critical Infrastructure Security

Critical infrastructure security refers to protecting the infrastructure without which


the security of a nation may be in danger. It consists of both cyber and physical
systems crucial to ensuring cyber security.

4.7.Mobile Security

Mobile security protects mobiles, tablets, or laptops from any malicious threats of
data loss or asset loss. With the popularity of mobile, it has become an essential part
of cybersecurity.

4.8.End-User Education

As the saying goes, knowledge is power, and awareness is the key to reducing cyber
crimes. Training employees and people about cybercrimes, and industry best
practices and protecting themselves from threats like social engineering are
incredibly important
5.CYBER THREATS
Keeping up with new technologies, security trends and threat intelligence is a
challenging task. It's necessary in order to protect information and other assets from
cyberthreats, which take many forms. Types of cyberthreats include the following:

5.1.Types of Cyber Threats

There are several different types of cyber threats. Here are some of the most common
ones.

Cyberterrorism:

It refers to illegal threats and attacks against networks or data stored in


systems. The intent is to coerce the owner (the government) for political or
ideological objectives. It is meant to cause widespread social disruption.

Trojans:

If you are familiar with the tale of the Trojan horse, you can deduce what a
trojan does. A trojan misleads the users into believing that it's a harmless file.
Once opened, it attacks the system and performs destructive action without you
even realizing it.

Malware:

Malware, or malicious software, includes spyware, worms, viruses, and


ransomware. It is sent over a network and meant to infect, steal, or do anything the
attacker wants. It can disrupt the system and even transfer sensitive data.
Denial of Service:

DOS attacks involve disrupting the traffic of the target system with the help of
multiple systems. Under this attack, the target system is overwhelmed with packets or
connection requests to prevent it from being accessed by legitimate users.

Adware:

Adware, or advertising-supported software, generates unwanted


advertisements in the software's user interface. It is done without permission.

Man-in-the-middle attack:

As the name suggests, this attack involves an attacker secretly intercepting and
relaying messages between two parties. The two parties believe they are
communicating with each other.

SQL Injection:

A code injection technique, SQL injection can destroy your database. The
attacker interferes with the queries an application is sending to its database.

Social Engineering:

Social engineering attacks take benefits of human frailty. It tricks and misleads
users into giving away sensitive information and bypassing security procedures.

Ransomware:

A type of malware attack, ransomware involves locking the target's system files,
mostly through encryption. The attacker demands a ransom in exchange for
decrypting the system.
Advanced Persistent Threats (APTs):

In this attack, the attacker can get unauthorized access to a system and stay there
for a prolonged period without getting caught. The aim can be to steal sensitive data.

Insider threats:

Insider threats are those initiated from inside the target organization. The insider
uses their authorized access to harm or disrupt the organization's systems.

The list of cyber threats is long. However, these are the most common attacks
employed by cybercriminals. Some other common cyber threats include cross-site
scripting attacks, exploit kits, business email compromise, spear phishing, etc.

.
6.BENEFITS OF CYBER SECURITY

After all that you've read about cybersecurity, it is clear that organizations cannot
properly function without an excellent cybersecurity department. Here are a few other
benefits of cybersecurity.

 It helps in the proper functioning of organizations by protecting them from any


malicious cyber attack.

 Cybersecurity also strengthens the mitigation and response.

 Cybersecurity helps in making the recovery process faster and more efficient.

 Having brilliant cybersecurity inspires confidence in customers and


stakeholders.
7.MYTHS OF CYBER SECURITY

Cybersecurity is unfortunately shrouded in myths. This might be because of how hard


it may look to someone not well-versed in technology. However, these myths can
lead to dangerous situations.

Here are some of the most common myths about cybersecurity.

Password is enough protection:

While there may have been a time when passwords provided enough security, it is no
longer so. Strong passwords can provide some semblance of security, but it is not
enough. It is imperative to create a multi-layer defense. You can start with multi-
factor authentication.

Small and medium-sized businesses are not a target:

Another popular myth is that only big corporations become the target of cyber
attacks. However, the truth is that small and medium-sized business is at similar
risks. In fact, a report by CyberPeace Foundation found that 43% of all cyberattacks
target small and medium-sized enterprises.
Encryption is not worth it:
Many organizations feel that encryption software is not worth it. However, it is a
misconception. Encryption is a crucial part of cyber defense. It can protect you from
ransomware attacks.

Deleting the file does the trick:

Deleting a file, even from the recycle bin, is not enough because your computer just
stores remains in the hard drive. Files can be easily recovered by using an easily
available recovery software. Therefore, the best way to delete a file permanently is to
use data-wiping software.

Data security is IT's concern:

While IT departments hold the most responsibility in ensuring data safety, it is not
only their concern. It is the responsibility of every member of the organization to
ensure the safety of their data. Therefore, employees should regularly take part in
cybersecurity awareness training to protect their data better.

You might also like