Understanding basics of Cyber Security:
Cyber Security refers to a digital bot that protects your system from digital harm. It protects and safeguards your data and prevents infection of the network. Just like a warrior would fight in a war, a cybersecurity expert will be in a constant battle to prevent breaches and leak of data. As cybersecurity personnel, when cyber-bullies attack your system, you will have to execute tasks such as identify threats, locate the cause and the source of the breach. To maintain a firewall, one needs to protect the data and information associated with it and inspect any back doors in the system. Work on the data loss for disaster recovery and safe retrieval of data.
Cyber Security basics include a good command of Linux systems & administration, strong background in understanding logic and Boolean operators, cloud computing and networking, hardware and networking knowledge, and ethical hacking. These are the foundation for beginning your career as a Cyber Security professional. These skills can be easily picked up by individuals with a strong mathematical background, introductory psychology, and excellent memory to remember the coding syntax.
What are the Top 5 Cyber Threats?
According to the IT Governance UK government these are the top 5 cyber security threats.
1. Malware
Malware is a type of file or software that has the primary purpose of causing harm to the system, thereby disrupting system processes.
2. Form Hijacking (Foam Jacking)
As the name suggests, it retrieves personal information that you fill in the form (online payments, addresses) by the insertion of a JavaScript program.
3. Backdoor Entry
A backdoor is literally a backdoor in the system that lets a third party control the system without the administrator’s knowledge.
4. Domain Name System (DNS) poisoning.
DNS poisoning can act as a gateway to redirect traffic to malicious and insecure web servers thereby, leaving you vulnerable.
5. Cryptocurrency Hijacking (Cryptojacking)
Black hackers can take control over your systems processing power to mine cryptocurrency, and with Bitcoins, value sky-rocketing users are at high risk with these attacks.
What are the 10 Steps to Cyber Security?
Here are the steps to cybersecurity published in 2012 by the National Cyber Security Centre of the United Kingdom.
1. Information Risk Management
When creating a server in an organization, many individuals can access the data and make your server vulnerable to cyber threats. The data can be edited or changed without the owner’s approval creating havoc in the system. Therefore, it is necessary to develop authorization access to specific individuals based on the level of clearance and restricting data to the particular organization. Thus, an Information Management Regime will establish Confidentiality, Integrity, and Availability.
2. Secure Configuration
Secure configuration refers to security protocols that need to be followed in order to safeguard the system. This can be achieved by creating stronger passwords and by insisting users change their passwords frequently. There should be limited permissions, and only specific software should be allowed as default settings of some software or programs can be a threat and can open a backdoor to black hat hackers. Removal of unwanted users and cache should be done frequently.
3. Network Security
When connected to the Internet, an organization’s server can possess a high risk of vulnerability to attack. To prevent this, traffic needs to be monitored, and the network needs to be designed for more robust firewall settings. Ensuring a secure configuration and design principles, a stronger foundation can be achieved to withstand any threat. Hence, a stronger baseline build will develop a secure network.
4. Managing user privileges
It is crucial to develop a network management system, to safeguard data breach risk and ensure security. This can be done with the help of a system that can log user activity and monitor it. In the event of a data leak, the log can be audited to detect the source, thereby preventing history from repeating itself. Therefore, by managing user privileges, you can control, monitor, and audit logs for smooth management of the network.
5. Incident Management
A team of competent individuals needs to be established for a quick response when a cyber threat is detected. When such an Incident Management Team (IMT) is established with proper specialist training, the risk of data loss is reduced, and casualties are minimal. The IMT can also report to law enforcement and can put the perpetrators behind bars preventing cybercrime in the future. ICT can also aid in recovering disaster data.
6. Malware Prevention
A regular scanning protocol needs to be done to detect malware in the system. Furthermore, an anti-malware system needs to be put in place, and a series of protocols should be established and needs to be followed. Vulnerable sources for malware and malicious content can be emails, browsing cookies & cache files, and should be monitored for malware.
7. Monitoring
A continuous need for surveillance is required in an organization’s server. It is a matter of seconds when unusual activity is detected, and your data can be lost. Therefore, a system should be developed to monitor and check user activity and the incoming traffic in the server. A monitoring strategy needs to put in place, and policies need to be developed.
8. Removable Media Controls
Pen drives on the USB port can be a source of malware injection in the system. Employees that use removable media to work on it can sometimes leave it connected to the system. A third party can take advantage of this, and the corporate data can be vulnerable. Therefore, strict policies need to be implemented by the administrator for the safety of the organization’s data.
9. Home and Mobile Networking
Individuals working remotely from their home using home or users connecting mobile devices on the corporate servers need to be educated about safe browsing and the cyber security experts’ policies. Apart from this, the mobile device needs to be applied with a strong baseline build. Secure networks like VPN or Virtual Private Networks should be utilized to work from home safely.
10. User Education and Awareness
Education and Awareness are crucial in an organization as individuals belong to different departments and may not have IT education. A user is responsible for the organization’s IT security. Creating Awareness will drastically reduce the risk, and attacks such as phishing emails, trojan virus, and social engineering can be prevented. This will safeguard the server and ensure that such cyber-attacks will not occur.