What is Cybersecurity?

What is Cybersecurity?

What is Cybersecurity?

Cybersecurity is a crucial field in maintaining the integrity of digital assets regardless of whether those assets are publicly accessible.

Cybersecurity involves:

  • protecting equipment, programs, networks, and more
  • mitigating an organization’s risk
  • creating protocols to maintain and ensure the safe handling of data

Emerging threats

With digital assets being a prime target for attackers, it is becoming increasingly clear that cybersecurity isn’t something anyone, even individuals, can ignore. From clicking on an infected webpage, to downloading an untrustworthy program, these actions can result in the compromising of an otherwise secure network.

An example of such a threat is ransomware. Ransomware often encrypts data and holds it at a ransom. In 2017, the “WannaCry” attack targeted a vulnerability in certain versions of Microsoft’s Windows Operating System. The attack was also designed to spread locally to other vulnerable computers, forcing desperate users to pay a criminal entity to regain access to critical files.

Others attacks include social engineering attacks, phishing scams, DDOS attacks, MITM attacks, XSS attacks, and more.

Defending against cyber threats

With an ever growing number of attacks, companies often employ both proactive and reactive protocols to mitigate some of the risk associated with vulnerabilities and human error.

For example, many organizations have proactively added a banner on top of external emails to combat phishing attacks. Unfortunately, this mitigation strategy fails when a user within the organization is compromised and sends emails from their company or academic account.

Proactive measures include: honeypot traps and network monitoring. These allow a company to detect new types of attacks and monitor for any compromised machines or software, resulting in a reduced attack surface.

Conclusion

Cybersecurity and cyberdefense are important fields that are employed to protect and mitigate attacks targeting an organization. For individuals, cybersecurity involves being careful with phishing scams, while employees of large organizations often follow stricter guidelines: two factor authentication, monitored network activity, and other proactive or reactive measures.

Did you find this article helpful?

0 out of 0 Bunnies found this article helpful

Glossary

DDoS

A Distributed Denial of Service attack is a category of attacks that target multiple areas on a server.

Honeypot

A type of trap used to redirect attackers and gather data for security research.

XSS

Cross Site Scripting.

MITM Attacks

MITM Attacks refer to "man-in-the-middle" attacks.

IDS

Intrusion Detection System. A set of rules to detect unauthorized activity in a network or device.

Prove your Knowledge.
Earn a bunny diploma.

Test your knowledge in our Junior and Master Quizes to see where you stand. Prove your mastery by getting A+ and recieving a diploma.

Start the QuizBunny with a diploma.