Cyber security
Cyber Security is the practice of identifying the vulnerabilities and threats associated with digital
systems and mitigating these risks. The term “cyber” refers to a nickname for an internet-connected
computer or any other device that uses a processor, input/output and networking connections. The
common threats include: viruses, worms, trojans and malware. A related term is cyber warfare which is
the use of cyber tools in warfare to achieve objectives that would not be possible by using physical
means such as bombs or missiles. Cyber security has always been an important issue but it became
prominent when major events happened such as the 2015 Bangladesh bank robbery where hackers stole
$81 million from the banks central account at its headquarters in Bangladesh. The role of cyber security
professionals is to protect critical systems and information. The main goal of cyber security is to prevent
hackers from gaining access to information or using nefarious actions that would put the users’
information at risk.
Cyber security is important because the government, military, law enforcement, and
private industry use many critical resources that could be negatively affected by cyber
attacks. Many of these systems are financial, such as banks, credit cards, ATMs, stock
markets and networks. Government agencies use software to manage the US budget
system and the military uses software to track troop movement. Because of these vital
uses, cyber attacks could cripple important services or even destroy the country’s
financial security. In order for companies to operate securely in today’s technological
world they need to implement cyber security protections. These protections include
firewall protection, anti-virus programs, encryption codes that keep hackers from easily
accessing sensitive data and data backup systems in case any security breach occurs that
causes damage to systems or information.
A successful cybersecurity approach has multiple layers of protection spread
across the computers, networks, programs, or data that one intends to keep
safe. In an organization, the people, processes, and technology must all
complement one another to create an effective defense from cyber attacks.
A
unified threat management
system can automate integrations across select
Cisco Security products and accelerate key security operations functions:
detection, investigation, and remediation.
Cyber security is of increasing concern for businesses, governments and individuals. Despite the
many controls and systems in place, there are still many cyber attacks that occur. Some of the
most recent high-profile attacks include: The Target data breach, Heartbleed bug, the WannaCry
attack and Bangladesh bank robbery. These events exposed customer’s personal information
which can be used by hackers and targeted for identity theft or as part of a fraudulent scheme.
A major concern to cyber security is providing more efficient support to better protect against
cyber related activities. This means an organization must have the information available to help
identify possible threats including understanding what possible methods hackers may use to gain
access, and how the organization can prepare for any potential attacks. Cyber security is a
constantly growing area of study and research. Some of the most recent research being done is
focused on cyber security in cyber space. The purpose of this paper will be to analyze if a
previous study found in 2012 correctly identified computers within an organization as well as their
movement throughout the network.
There are two main findings that are sought out which were: 1) how computers move across networks
(e.g. LAN, WAN, etc.), and 2) how computers might behave in a network. The assumption is that
computers within an organization move between locations (e.g., building or branch offices) and they may
change their location(s). Also, the behavior of a computer can be tracked as observed (e.g., its IP address
changes from one to another, or its Whois information changes from one domain name service provider
to another).
Many networks have become globalized today using the internet as the primary means of communication
with many different locations and companies around the world. A new report published by Gartner Inc.
named the number of organizations that use geographic information systems (GIS) for cyber security
have risen dramatically to two-thirds. The other third are using other technologies, including intrusion
detection systems (IDS), firewalls, and antivirus software.
No information security agency is perfect. Most infosec
practitioners in the world today agree that no agency can
completely protect their organization from all possible threats.
However, the best agencies should have a variety of defense
techniques which can work together as an effective strategy to
secure the organization from malicious activities.
Do'stlaringiz bilan baham: |