SlideShare a Scribd company logo
Cyber Security
The body of technologies, processes and practices designed to protect networks, devices,
programs and data from attack, damage, or unauthorized access is referred to as cyber
security. It is also known as information technology security. The practice is used by
individuals and enterprises to protect against unauthorized access to data centers and
other computerized systems.
Cyber-attacks are usually focused at accessing, changing, or destroying sensitive
information; extorting money from users; or interrupting normal business processes. The
aim of implementing cyber security is to provide infallible security for computers, servers,
networks and to protect the data stored on these devices from attackers with evil intent.
Cyber-attacks are designed to access, delete or extort a user’s sensitive data. Medical,
government, military, corporate and financial organizations, collect, process and store
exceptional amount of data on computers and other devices. Most of this data contains
sensitive information, whether that be intellectual property, financial data, personal
information, or other types of data for which unauthorized access or exposure could have
negative consequences. Organizations transfer sensitive data across networks and other
devices for business purposes; making cyber security vital.
Types of Cyber Security Threats:
Phishing: An email-borne attack that involves tricking the email recipient into disclosing
confidential information or downloading malware by clicking on a hyperlink in the
message. It’s the most common type of cyber-attack. You can help protect yourself
through education or a technology solution that filters malicious emails.
Spear Phishing: A more sophisticated form of phishing where the attacker learns about
the victim and impersonates someone he or she knows and trusts.
Trojans: Named after the Trojan Horse of ancient Greek history, the Trojan is a type of
malware that enters a target system looking like one thing, e.g. a standard piece of
software, but then lets out the malicious code once inside the host system.
Ransomware: An attack that involves encrypting data on the target system and
demanding a ransom in exchange for letting the user have access to the data again.
Paying the ransom does not guarantee that the files will be recovered or the system
restored. These attacks range from low-level nuisances to serious incidents like the
locking down of the entire city of Atlanta’s municipal government data in 2018.
Malware: It is a type of software designed to gain unauthorized access or to cause
damage to a computer, e.g. corrupting data or taking over a system.
“Man in the Middle” (MitM) attack: An attacker establishes a position between the
sender and recipient of electronic messages and intercepts them, perhaps changing them
in transit. The sender and recipient believe they are directly communicating with one
another. A MitM attack might be used in the military to confuse an enemy.
Denial of Service attack or Distributed Denial of Service Attack (DDoS): An attacker takes
over many devices and uses them to invoke the functions of a target system, e.g. a
website, causing it to crash from an overload of demand.
Challenges:
With the development and advancement of technologies, organizations and systems are
more prone to cyber-attacks as attackers are becoming more innovative. With the more
entry points, there are for attacks, the more cyber security is needed to secure networks
and devices. Organizations and services should implement cyber security tool, training,
risk management approaches and continually update systems with the evolution of
technologies. This includes ensuring that all the elements of cyber security are continually
changed and updated to protect against potential vulnerabilities.
Additionally, organizations today gather a lot of individual data which attract cyber
criminals who wants to steal personally identifiable information. For example, an
organization that stores personally identifiable information in the cloud may be subject to
a ransomware attack, and should do what they can to prevent a cloud breach.
Another challenge to cyber security is job shortage. The need for cyber security personnel
to analyze, manage and respond to incidents has increased with the increased
importance of data from businesses. It is estimated that there are two million unfilled
cyber security jobs worldwide. Cyber security Ventures also estimates that by 2021, there
will be up to 3.5 million unfilled cyber security jobs.
Another notorious trend is the continuing “improvement” of what experts call “Advanced
Persistent Threats” (APTs). As Business Insider describes APTs, “It’s the best way to define
the hackers who burrow into networks and maintain ‘persistence’ — a connection that
can’t be stopped simply by software updates or rebooting a computer.”
With artificial intelligence (AI), experts are trying to identify and prevent sophisticated
cyber-attacks with minimal human intervention. AI networks and machine learning has
enabled security professionals to learn about new attack vectors. AI and machine learning
in areas that have high-volume data streams and can help in areas such as:
• Correlating data- which focuses on organizing data, identifying possible threats within
data and predicting an attacks next step.
• Detecting infections
• Generating protections- without putting a strain on resources.
• Implementing protections.
Benefits of Cyber Security:
Benefits of utilizing cyber security includes:
• Protection for data and networks.
• Prevention of unauthorized users.
• Business protection against malware, ransom-ware, phishing and social engineering.
• Improves recovery time after a breach.
• Protection for end-users.
• Improved confidence in the product for both developers and customers.
Cyber Security Careers:
Cyber security is the body of technologies, processes, and practices designed to protect
networks, computers, and data from attack, damage, and unauthorized access. Cyber
security certification teach professionals to spot vulnerabilities, defend attacks, and
immediately respond to emergencies. Leading the effort to protect our devices and
networks from cyber-attacks are cyber security experts, each with specialized training
and skills that make them menacing against each hacker. If you are considering
advancement in your career in the IT field and are interested in specializing in security,
cyber security certification is a great choice. It is an effective way of validating your skills
and show a current or potential employer that you are qualified and properly trained.
IT professionals and other computer specialists are needed in security jobs, such as:
Chief Information Security Officer (CISO): Individual’s job is to implement the security
program across the organization and oversees the IT security department’s operations.
Security Engineer: This individual protects the networks and computer systems of a
company from any security threats and attacks. A security engineer is responsible for
establishing and implementing security solutions that can defend a company and its
networking assets through a variety of ways.
Security Analyst: This individual has several responsibilities that include planning security
measures and controls, protecting digital files, and conducting both internal and external
security audits.
Security Architect: This individual is responsible for planning, analyzing, designing,
testing, maintaining and supporting an enterprise’s critical infrastructure.
For more details Visit our site: https://www.illumeo.com

More Related Content

Cyber Security

  • 2. The body of technologies, processes and practices designed to protect networks, devices, programs and data from attack, damage, or unauthorized access is referred to as cyber security. It is also known as information technology security. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
  • 3. Cyber-attacks are usually focused at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. The aim of implementing cyber security is to provide infallible security for computers, servers, networks and to protect the data stored on these devices from attackers with evil intent. Cyber-attacks are designed to access, delete or extort a user’s sensitive data. Medical, government, military, corporate and financial organizations, collect, process and store exceptional amount of data on computers and other devices. Most of this data contains sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences. Organizations transfer sensitive data across networks and other devices for business purposes; making cyber security vital.
  • 4. Types of Cyber Security Threats: Phishing: An email-borne attack that involves tricking the email recipient into disclosing confidential information or downloading malware by clicking on a hyperlink in the message. It’s the most common type of cyber-attack. You can help protect yourself through education or a technology solution that filters malicious emails. Spear Phishing: A more sophisticated form of phishing where the attacker learns about the victim and impersonates someone he or she knows and trusts. Trojans: Named after the Trojan Horse of ancient Greek history, the Trojan is a type of malware that enters a target system looking like one thing, e.g. a standard piece of software, but then lets out the malicious code once inside the host system.
  • 5. Ransomware: An attack that involves encrypting data on the target system and demanding a ransom in exchange for letting the user have access to the data again. Paying the ransom does not guarantee that the files will be recovered or the system restored. These attacks range from low-level nuisances to serious incidents like the locking down of the entire city of Atlanta’s municipal government data in 2018. Malware: It is a type of software designed to gain unauthorized access or to cause damage to a computer, e.g. corrupting data or taking over a system. “Man in the Middle” (MitM) attack: An attacker establishes a position between the sender and recipient of electronic messages and intercepts them, perhaps changing them in transit. The sender and recipient believe they are directly communicating with one another. A MitM attack might be used in the military to confuse an enemy.
  • 6. Denial of Service attack or Distributed Denial of Service Attack (DDoS): An attacker takes over many devices and uses them to invoke the functions of a target system, e.g. a website, causing it to crash from an overload of demand. Challenges: With the development and advancement of technologies, organizations and systems are more prone to cyber-attacks as attackers are becoming more innovative. With the more entry points, there are for attacks, the more cyber security is needed to secure networks and devices. Organizations and services should implement cyber security tool, training, risk management approaches and continually update systems with the evolution of technologies. This includes ensuring that all the elements of cyber security are continually changed and updated to protect against potential vulnerabilities.
  • 7. Additionally, organizations today gather a lot of individual data which attract cyber criminals who wants to steal personally identifiable information. For example, an organization that stores personally identifiable information in the cloud may be subject to a ransomware attack, and should do what they can to prevent a cloud breach. Another challenge to cyber security is job shortage. The need for cyber security personnel to analyze, manage and respond to incidents has increased with the increased importance of data from businesses. It is estimated that there are two million unfilled cyber security jobs worldwide. Cyber security Ventures also estimates that by 2021, there will be up to 3.5 million unfilled cyber security jobs. Another notorious trend is the continuing “improvement” of what experts call “Advanced Persistent Threats” (APTs). As Business Insider describes APTs, “It’s the best way to define the hackers who burrow into networks and maintain ‘persistence’ — a connection that can’t be stopped simply by software updates or rebooting a computer.”
  • 8. With artificial intelligence (AI), experts are trying to identify and prevent sophisticated cyber-attacks with minimal human intervention. AI networks and machine learning has enabled security professionals to learn about new attack vectors. AI and machine learning in areas that have high-volume data streams and can help in areas such as: • Correlating data- which focuses on organizing data, identifying possible threats within data and predicting an attacks next step. • Detecting infections • Generating protections- without putting a strain on resources. • Implementing protections.
  • 9. Benefits of Cyber Security: Benefits of utilizing cyber security includes: • Protection for data and networks. • Prevention of unauthorized users. • Business protection against malware, ransom-ware, phishing and social engineering. • Improves recovery time after a breach. • Protection for end-users. • Improved confidence in the product for both developers and customers.
  • 10. Cyber Security Careers: Cyber security is the body of technologies, processes, and practices designed to protect networks, computers, and data from attack, damage, and unauthorized access. Cyber security certification teach professionals to spot vulnerabilities, defend attacks, and immediately respond to emergencies. Leading the effort to protect our devices and networks from cyber-attacks are cyber security experts, each with specialized training and skills that make them menacing against each hacker. If you are considering advancement in your career in the IT field and are interested in specializing in security, cyber security certification is a great choice. It is an effective way of validating your skills and show a current or potential employer that you are qualified and properly trained.
  • 11. IT professionals and other computer specialists are needed in security jobs, such as: Chief Information Security Officer (CISO): Individual’s job is to implement the security program across the organization and oversees the IT security department’s operations. Security Engineer: This individual protects the networks and computer systems of a company from any security threats and attacks. A security engineer is responsible for establishing and implementing security solutions that can defend a company and its networking assets through a variety of ways.
  • 12. Security Analyst: This individual has several responsibilities that include planning security measures and controls, protecting digital files, and conducting both internal and external security audits. Security Architect: This individual is responsible for planning, analyzing, designing, testing, maintaining and supporting an enterprise’s critical infrastructure. For more details Visit our site: https://www.illumeo.com