What is Cybersecurity?
Cybersecurity is a crucial field in maintaining the integrity of digital assets regardless of whether those assets are publicly accessible.
Cybersecurity involves:
- protecting equipment, programs, networks, and more
- mitigating an organization’s risk
- creating protocols to maintain and ensure the safe handling of data
Emerging threats
With digital assets being a prime target for attackers, it is becoming increasingly clear that cybersecurity isn’t something anyone, even individuals, can ignore. From clicking on an infected webpage, to downloading an untrustworthy program, these actions can result in the compromising of an otherwise secure network.
An example of such a threat is ransomware. Ransomware often encrypts data and holds it at a ransom. In 2017, the “WannaCry” attack targeted a vulnerability in certain versions of Microsoft’s Windows Operating System. The attack was also designed to spread locally to other vulnerable computers, forcing desperate users to pay a criminal entity to regain access to critical files.
Others attacks include social engineering attacks, phishing scams, DDOS attacks, MITM attacks, XSS attacks, and more.
Defending against cyber threats
With an ever growing number of attacks, companies often employ both proactive and reactive protocols to mitigate some of the risk associated with vulnerabilities and human error.
For example, many organizations have proactively added a banner on top of external emails to combat phishing attacks. Unfortunately, this mitigation strategy fails when a user within the organization is compromised and sends emails from their company or academic account.
Proactive measures include: honeypot traps and network monitoring. These allow a company to detect new types of attacks and monitor for any compromised machines or software, resulting in a reduced attack surface.
Conclusion
Cybersecurity and cyberdefense are important fields that are employed to protect and mitigate attacks targeting an organization. For individuals, cybersecurity involves being careful with phishing scams, while employees of large organizations often follow stricter guidelines: two factor authentication, monitored network activity, and other proactive or reactive measures.