Cybersecurity and Cyberattacks in Our Generation!

NETWORK SECURITY

Network security focuses on protecting computer networks from intruders, whether they are targeted attackers or opportunistic malware. It involves implementing measures to secure network infrastructure and prevent unauthorized access.

APPLICATION SECURITY

Application security is concerned with keeping software and devices free of threats. Successful security begins in the design stage, well before a program or device is deployed. It emphasizes securing applications to prevent compromise and unauthorized access to sensitive data.

INFORMATION SECURITY

Information security safeguards the integrity and privacy of data, both in storage and in transit. It involves implementing measures to protect data from unauthorized access, ensuring its confidentiality, integrity, and availability.

OPERATIONAL SECURITY

Operational security includes processes and decisions for handling and protecting data assets. This umbrella term encompasses user permissions, network access controls, and procedures that dictate how and where data may be stored or shared within an organization.

DISASTER RECOVERY AND BUSINESS CONTINUITY

Disaster recovery and business continuity planning define how an organization responds to a cyber-security incident or any event causing the loss of operations or data. Disaster recovery policies guide the restoration of operations and information to return to the same operating capacity. Business continuity plans outline strategies for operating without certain resources during a crisis.

END-USER EDUCATION

End-user education is a vital aspect of cybersecurity, addressing the unpredictable human factor. Individuals can inadvertently introduce viruses or compromise secure systems by not following good security practices. Educating users on actions such as deleting suspicious email attachments and avoiding unidentified USB drives is crucial for overall organizational security.

The scale of the global cyber threat is rapidly evolving, with an increasing number of data breaches each year. In the first nine months of 2019 alone, 7.9 billion records were exposed, indicating a significant rise compared to the previous year. Cybercriminals target various sectors, with medical services, retailers, and public entities experiencing the most breaches due to the collection of valuable financial and medical data.

In response to the increase rapidly cyber threat, global spending on cybersecurity solutions is on the rise. Predictions by Gartner estimate cybersecurity spending to reach$188.3 billion in 2023 and surpass $260 billion globally by 2026. Governments worldwide are providing guidance to help organizations perform effective cybersecurity practices.

In the U.S., the National Institute of Standards and Technology (NIST) has developed a cybersecurity framework recommending continuous, real-time monitoring of all electronic resources to combat the rise of evil code. The U.K. government’s National Cyber Security Centre emphasizes the importance of system monitoring in its “10 steps to cyber security” guidance. In Australia, The Australian Cyber Security Centre (ACSC) regularly publishes guidance on countering the latest cyber-security threats.

Types of Cyber Threats:

The threats countered by cybersecurity fall into three categories: cybercrime, cyber-attacks, and cyberterrorism.

  1. Cybercrime: Involves single actors or groups targeting systems for financial gain or to cause disruption.
  2. Cyber-attack: Often involves politically motivated information gathering.
  3. Cyberterrorism: Intended to undermine electronic systems to cause panic or fear.

Venomous actors employ various methods to threaten cybersecurity, including:

1. Malware: Vengeful software designed to disrupt or damage a user’s computer. Types include viruses, Trojans, spyware, ransomware, adware, and botnets.

2. SQL Injection: A cyber-attack used to take control of and steal data from a database by exploiting vulnerabilities in data-driven applications.

3. Phishing: Cybercriminals target victims with emails appearing to be from legitimate sources, aiming to obtain sensitive information.

4. Man-in-the-Middle Attack: A cyber threat where an attacker intercepts communication between two individuals to steal data.

5. Denial-of-Service Attack: Cybercriminals overwhelm networks and servers with traffic, rendering a system unusable and preventing vital functions.

Latest Cyber Threats:

  1. Dridex Malware (December 2019): Leader of an organized cyber-criminal group charged for a global Dridex malware attack affecting the public, government, infrastructure, and business worldwide.
  2. Romance Scams (February 2020): FBI warns about confidence fraud using dating sites, chat rooms, and apps, affecting victims seeking new partners.
  3. Emotet Malware (Late 2019): Australian Cyber Security Centre warns of a widespread global cyber threat from Emotet malware, a sophisticated trojan capable of data theft.

End-User Protection: End-user protection, or endpoint security, is critical as individuals often inadvertently introduce malware or other threats. Cybersecurity measures include cryptographic protocols, real-time malware detection, and security software that scans, quarantines, and removes malicious code.

Cyber Safety Tips

  1. Update Software and Operating System: Ensure you benefit from the latest security patches.
  2. Use Anti-virus Software: Employ security solutions that detect and remove threats, keeping the software updated.
  3. Use Strong Passwords: Ensure passwords.

HAVE YOU WATCHED THE “LEAVE THE WORLD BEHIND”

This move must actually dive you through how cyber-attacks are very dangerous to our country and the world as a whole, the movie has made everyone talking about it because they believe it could come through since it was produced by a former president of the United State of America, you should watch it and share your view.

https://truthmafia.com/tommy-truthful/netflix-leave-the-world-behind-decode-doenut-tommy-truthful-ani/

This movie can tell you how perilous it is for cyberattacks, just like Pegasus which is also far more dangerous than we think.

PEGASUS

Pegasus, a polished spyware created by NSO Group, has raised alarms worldwide due to its dangerous capabilities. This intelligent tool, once infiltrated into smartphones, enables complete monitoring, posing severe threats to privacy and security. It can exploit wide open without user consent, accessing messages, calls, emails, and even activating cameras and microphones.

The alleged misuse of Pegasus for targeting journalists, activists, and political independent thinkers has underscored the potential for abuse. The danger lies not only in the invasion of personal space but also in the erosion of democratic values as it bargains freedom of expression and ruin the confidentiality of sensitive communications.

Governments deploying Pegasus for unauthorized surveillance raise ethical concerns, emphasizing the need for robust cybersecurity measures to safeguard against such invasive technologies. As debates on regulatory frameworks intensify, the dark side of Pegasus serves as a stark reminder of the evolving challenges in preserving individual liberties in an increasingly digitized world.

This is what is going on in the tech world which we have not pay heed to and must watch out for in the future. I will leave you one question behind.

what if one day whatever you did on the internet, text on WhatsApp, signals, Instagram, Facebook and many more is used against you?

Exit mobile version