Cybersecurity

Cybersecurity
Cybersecurity

Cyber attacks are increasing in frequency while the size of the target is becoming much larger and the social importance raising the critical need for cybersecurity.

Cybersecurity is increasingly becoming a hot topic.  With recent hacks on the Colonia Pipeline and JBS, the world’s largest meat producer, the US government encourages businesses to protect their systems and customers.

Cybersecurity may also be referred to as computer security, information technology, or IT security.  It protects networks, computers, network servers, or devices from unauthorized information disclosure.  This is done by obtaining the information by disruption or misdirection of services provided.

The world has become reliant on computer systems, the Internet, wireless networks, and network standards such as Bluetooth and Wi-Fi. In addition, the demand and use of smartphones, televisions, and other devices create more opportunities for hackers, increasing the risk for businesses and consumers.

The NSA (National Security Agency) protects U.S. information systems while collecting foreign intelligence.  The actions the NSA is responsible for the protection and defense of information.  The NSA is one of America’s biggest secrets with very little transparency to “protect.”

Protecting US systems and information includes evaluating software and identifying security flaws while correcting the deficiencies.

The defense action is to collect intelligence from discovering security flaws to retrieve the information.  However, correcting the defects prevents the NSA from managing their intelligence, creating a conflict.

Common vulnerabilities and attacks:

  1. Backdoor
  2. Denial-of-service attack
  3. Direct-access attacks
  4. Eavesdropping
  5. Multi-vector, polymorphic attacks
  6. Phishing
  7. Privilege escalation
  8. Reverse engineering
  9. Social engineering
  10. Spoofing
  11. Tampering
  12. Malware
  13. More possibly exist

Additional citations will be added soon – worked in progress.

NOTES: we “intend” to create easy-to-read content that regular business owners are comfortable reading to learn more about this increasingly necessary action to protect their business.  While it is intended to serve as a summary, it is vital to reduce it to a resume.

Links:

  1. Wikipedia – Cybersecurity
  2. Home
  3. Sitemap