What is Cyber Security
The digital world is continually changing, and cyber security has become a concern for individuals, businesses and governments alike.
The purpose of cyber security is to ward off data breaches, provide a safe environment in the case of hardware failure and to protect information from ransom attacks from criminals, who can make your data inaccessible unless a ransom payment is agreed, normally using cryptocurrency. Individuals who can gain such unauthorized access to the data on your computer system or computers networks can range from hackers who write scripts to try to compromise cyber security or organised criminal enterprises who will carry out technically advanced attacks, purely for illegal financial gain.
Businesses rely on Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) for their security planning. It is essential that everyone takes cyber security seriously as ignoring this growing problem will eventually result in an IT disaster. Today, it forms an indispensable part of the risk management strategy for any organisation.
Cyber Security applies to all, whether for an individual who should ensure that software updates and virus protection is kept up to date, without fail, to large organisations, who rely on specialists within the organisation to ensure their IT infrastructure is fully protected with suitable planning in place, to recover from data breaches. IT is continually changing and becoming more advanced and complex, so higher level management ensure the security protection is in place, and that staff within the organisation are fully aware of the online risks.
No software is bug-free, and this poses a further risk. Bugs in software can potentially create security issues, and this is the reason why companies such as Microsoft are continually releasing updates for their products such as Windows and Word. These updates may include bug fixes but typically will be addressing security risks that may have been identified.
Cyber Security Training
In this digital age, the IT users are often the cause of cyber security issues. Each user has a different purpose when using a computer. While some have better knowledge about computer security, many don’t. It is essential that each user understands the cyber security risks, and how they can work to minimise the risk of a security breach.
Some approaches that assist the cyber security planning and programmes are as follows:
- Software developers need to not only be able to develop software, but they should code in an approach that does not allow easy access to potential hackers. Any software developed should also be a PEN (Penetration) tested, this is a key element of cyber security, identify to developers security flaws within the software.
- Training individuals to understand how to ensure best security at all times, such as ensuring business software and virus protection has the latest updates applied.
- Training end users to be able to identify emails that are phishing or to not open attachments from unknown sources or social media.
No business can be 100% protected from cyber attacks, regardless of the commitment each organisation has to cyber security. However, cyber-attacks typically will occur through the most vulnerable point of access. These weak points are often easy to secure, and if businesses follow basic cyber security protocol, the risk can be minimised a great deal. These simple security procedures which are also known as cyber hygiene include elements such as.
- Ensure the latest software updates are installed.
- Ensure the latest virus software is installed.
- Ensuring strong authentication such as strong passwords and two-factor authentication (2FA)
- Not storing sensitive data in locations that can be easily accessed.
These are just the basics. It is necessary for businesses to extend these practices much further to maximise their cyber security, as experienced hackers will find any weaknesses that may exist. With technology continuing to advance, the security risks are now expanding beyond computers in business, and at homes, there are now so many physical systems that can be hacked, including:
- Automotive systems
- Airlines systems
- Internet-enabled electronic devices
- Automated systems such as traffic lights in a busy city
The Internet of Things (IoT), also brings new challenges for cyber security. With more and more reliance on these systems, cybersecurity has never been more critical. New regulations, such as the GDPR, is adding further complications to cybersecurity. The GDPR, for example, has a clear security policy, with large GDPR fines for non-compliance. With cyber attacks becoming more frequent and destructive, resulting in potentially huge financial losses for businesses as well as their credibility, businesses are looking to experience cyber security professionals to ensure their organisations are fully protected.
Finding suitably experienced professionals has become a difficult task, with the sudden rise in cyber attacks, there is now a distinct shortage of suitable candidates for these high-end security roles.
The key elements of cybersecurity
The definition of cybersecurity needs to be understood more granularly. Businesses with cybersecurity strategies need to ensure that each of the subcategories is considered, overlooking any, potentially will leave organisations vulnerable.
Communities rely on critical infrastructure for their day to day existence. These systems include hospitals, utility companies such as electric, gas or water, and automated systems used throughout cities such as traffic lights and railway crossings for example.
These critical infrastructure systems are connected to the Internet, and anything connected to the internet is at risk of a cyber attack. The organisations that manage the critical infrastructure must ensure the highest level of planning for cybersecurity, and continually re-evaluate their planning, contingency plans, and risk analysis/prevention is an ongoing process.
Protection of data and information on a network within an organisation can be controlled with different levels of login/user access. Such a move limits the access for individuals within an organisation and for malicious users from outside the organisation that may have gained access.
There are specialised tools that monitor traffic on a network; these tools will also highlight potential risks. The issue with these tools, however, they are continually generating data. Due to the thousands of logs that are created, it is possible that genuine alerts are missed in the process. With the continued advancement of Artificial Intelligence (AI) and machine learning, security software can identify and alert of imminent risks.
More organisations are storing and sharing data on the Cloud, such as:
- GSuite for emails, storage, and productivity
- DropBox and One Drive for storage
- Xero for accounts
- Office365 for productivity
This creates further issues with regard to cybersecurity and also for new regulations like the GDPR. Poorly configured cloud solutions can result in cyber attacks, and it introduces a substantial risk. Cybersecurity is no longer under the control of your organisation. Businesses are relying on others to implement cyber security strategies. Organisations should carefully consider individual cloud solutions before taking the leap, perform due diligence to ensure these vendors also take cyber security seriously.
The most vulnerable area for cybersecurity is web applications. With developers worldwide creating web applications, each development team has a different skill set and coding standards. Often developers have not developed the systems with secure coding practices, leaving these systems vulnerable and prone to attack.
Web applications should be tested for security weaknesses by performing Penetration (PEN) testing. Software such as OWASP or Fortify will identify issues within web applications that can be addressed by the developers. PEN testing is not a one-off procedure; the process should be repeated at regular intervals as new hacking techniques become known, ensure software is always secure.
This can be related to any system that can be accessed via the Internet, such as automated lighting and heating at home, fitness apps tracking your daily actions or a speed sensor in a motor vehicle for an insurance company.
IoT systems are installed, and the software or security updates are ignored. Such behaviour can risk the privacy of the users of the IoT systems and also others as often the IoT systems are part of a botnet.
What are the different types of cyber threats?
Cybersecurity is essential to protect against the three most common types of cyber attacks, as listed below.
- Confidentiality – this type of cyber attack is simply about gaining access to IT equipment to obtain personal information from an individual or a business. The information obtained can be used for credit card fraud or identity theft to allow other documents such as passports to be produced. Certain countries may also use this approach to obtain personal information from governments for example.
- Integrity or Sabotage – this form of cyber threat aims to destroy or corrupt information within online systems, making the systems unusable for the individuals or businesses that rely on them. This type of attack can vary in size from just a minor corruption of data or substantial damage when criminals are typically looking to benefit from this type of cyber attack.
- Availability: Ransomware is becoming a major problem by making systems unavailable to users by encrypting files. Unless a proper recovery plan is in place by the cybersecurity team, often the only way to regain access to the encrypted systems is by making a ransom payment, typically with untraceable cryptocurrency. DDOS (Distributed Denial of Service) attacks are common by forcing large volumes of data across a network to make it inaccessible.
How are cyberattacks carried out?
- Social Engineering – this approach is one of the oldest approaches used by criminals to gain access to valuable information. Viruses such as Trojan Horses may exist on certain websites, either intentionally or unknown to the website owner.
Visitors to the web site may open files, and this leads to the virus being downloaded to their equipment allow the virus to gain access to personal information.
Although cybersecurity can help to protect against this type of access, the best form of protection is the education of the users. Accessing only trusted sites and to carefully consider files that are downloaded, are key considerations.
- Phishing – one of the most common approaches to gain useful and personal information is by phishing. A genuine email may be received from what appears to be your bank, for example, requesting you to login to your bank account. Information such as your username and password is then captured and re-used to gain access to your accounts. To avoid falling prey to phishing attacks, two-factor authentication (2FA) is recommended, when logging into bank accounts for example, as not only is it necessary to log in to the website, but also a second authentication can be sent to your mobile phone ensuring additional protection.
- Out of date software – software developers take cybersecurity seriously, and new updates are regularly released to not only fix bugs but also to ensure that their software continues to be as secure as possible against cybersecurity attacks. It is critical that the software updates are installed by businesses, as software not kept up to date is more at risk of a cyber attack.
Finding the best team possible to manage your organisation’s cybersecurity strategy is a difficult task. In fact, with stringent laws like GDPR taking effect in the European Union, the demand for cybersecurity resources is at its highest, and there is certainly a skill shortage.
Protecting organisations data and infrastructure has never been more important, with a cybersecurity team now requiring different skills from
- Security Engineer
- Information Security Officer
- Data Protection Officer
- Penetration Testers
Dedicated cyber security teams are now paramount and are in high demand with organisations ready to pay them hefty packages. The era has passed when cybersecurity may have been one of the tasks of one of the technical engineers. The cybersecurity roles are now specialist.
Cybersecurity is a 24/7/365 procedure, working around the clock to ensure internal systems are well protected and when a potential attack is identified, reacting quickly to rectify the attack. A rapidly changing environment that relies on a proactive team to continually protect the businesses interests.
The following are key roles in the cybersecurity team.
Chief Information Security Officer (CISO)
This is the lead role in the cybersecurity team; the CISO oversees the cyber security department. The CISO defines the organisation’s security policies and procedures and ensures that all security planning in place protects the organisation in the case of a cyber attack.
✓ Cyber Security Analyst
The Cyber Security Analyst has a number of key responsibilities within an organisation.
- Ensure that there is a security plan in place that has been fully tested. The plan should continue to be updated and evolve.
- Protection of data and files held within the organisation, ensuring that only the appropriate individuals can have access to these files.
- Monitor access, identifying any potential security breaches. Security breaches should be analysed to identify the vulnerability and rectified.
- Ongoing security audits both internally and externally. Appropriate network systems should be in place to prevent attacks. In the case of an intrusion, network tools should detect these intrusions and follow an incident response protocol.
- Define and manage the organisation’s corporate security policy.
✓ Security Architect
The Security Architect sits in between the management and the technical team. Their role is to ensure the organisation’s network and security infrastructure is configured to meet the businesses cybersecurity requirements. The Security Architect must have an excellent understanding of the businesses and technology to ensure that the solution implemented is the correct solution.
✓ Security Engineer
This role within the cybersecurity team requires the Security Engineer to be at the forefront of the organisation. The individual need to be able to communicate well throughout the business and have excellent technical skills to fulfil this role.
The key purpose of this role is to ensure that the infrastructure, network, and data centres are fully secure and to develop and evolve strategies that continue to protect the organisation’s infrastructure.
Tags: 10 steps to cyber security, budd e cyber security education, about cyber security, advanced cyber security, bae cyber security, best cyber security companies stock, best cyber security companies uk, best cyber security qualifications, best laptop for cyber security, bristol university cyber security, british security, cyber security education, cyber security education requirements, centre of excellence in cyber security governance risk and compliance cgrc, columbia university cyber security, corporate cyber security, computer protection, computer protection services, computer safety, computer security, computer security architecture, computer security code, computer security companies, computer security definition, computer security news, computer security vs network security, cyber security, cyber security 2017, cyber security accreditation, cyber security administrator, cyber security advice, cyber security alerts, cyber security and information security, cyber security apprenticeships uk, crest cyber security, cyber security articles, cyber security assessment, cyber security attacks, cyber security awareness, cyber, cyber security background, cyber attack definition, cyber attack meaning, cyber breach, cyber security blogs, cyber computer, cyber security books, cyber security business, cyber security campaign, cyber definition, cyber security career path uk, cyber security centre uk, cyber security certification uk, cyber security challenge uk, cyber security companies, cyber security companies list, cyber security companies uk, cyber security competition, cyber security concepts, cyber security concerns, cyber governance risk and compliance, cyber security conference uk, cyber incident examples, cyber news, cyber news network, cyber news uk, cyber security dashboard, cyber protection, cyber security data, cyber resilience and cyber security, cyber security definition, cyber risk compliance, cyber risk compliance with gdpr, cyber security degree salary uk, cyber security and gdpr, cyber security employment, cyber security annual salary, cyber security environment, cyber security audit, cyber security awareness month, cyber security awareness survey, cyber security events, cyber security bae, cyber security graduate, cyber security breaches survey 2016, cyber security brochure, cyber security companies birmingham, cyber security companies london, cyber security conference, cyber security consulting firms uk, cyber security issues, cyber security crisis management plan, cyber security it companies, cyber security detection, cyber security doc, cyber security leaders, cyber security lessons, cyber security europe, cyber security evaluation tool download, cyber security management, cyber security exam, cyber security exhibition, cyber security masters uk, cyber security expert certification, cyber security expo, cyber security mission, cyber security fellowship, cyber security model, cyber security firms, cyber security forensic network, cyber security month, cyber security forum, cyber security or cybersecurity, cyber security handbook, cyber security organizations, cyber security overview, cyber security in banking, cyber security in banking sector ppt, cyber security in london, cyber security incident report template, cyber security incident response, cyber security plus, cyber security indicators, cyber security internal audit, cyber security policy, cyber security precautions, cyber security private sector, cyber security problems, cyber security products, cyber security program, cyber security projects, cyber security protection, cyber security protection methods, cyber security london, cyber security providers, cyber security management a governance risk and compliance framework, cyber security qualifications uk, cyber security management a governance risk and compliance framework pdf, cyber security manchester university, cyber security maritime, cyber security reading, cyber security market, cyber security market analysis, cyber security regulations uk, cyber security masters degree, cyber security masters degree online, cyber security research, cyber security news, cyber security no degree, cyber security resources, cyber security opportunities, cyber security responsibilities, cyber security overview ppt, cyber security review, cyber security risk assessment, cyber security plan example, cyber security risk definition, cyber security plan template, cyber security risks, cyber security podcasts 2017, cyber security roles, cyber security policy uk, cyber security pro, cyber security scholarships, cyber security procurement language for control systems, cyber security product categories, cyber security services companies, cyber security services framework, cyber security sites, cyber security software, cyber security solutions, cyber security report pdf, cyber security space, cyber security standards, cyber security risk regulation and compliance, cyber security standards uk, cyber security rss feeds, cyber security startups uk, cyber security statistics, cyber security summary, cyber security sales, cyber security systems, cyber security services, cyber security services 3, cyber security small business guide, cyber security software uk, cyber security terms, cyber security solution providers, cyber security test, cyber security specialist, cyber security tools, cyber security startups, cyber security strategy, cyber security training, cyber security strategy pdf, cyber security summit, cyber security threats, cyber security tutorial, cyber security tools 2017, cyber security uk, cyber security university, cyber security video, cyber security vs it security, cyber security vulnerabilities, cyber security training free online, cyber security undergraduate degree, cyber security university ranking uk, cyber security vulnerability assessment, cyber solutions, cyber uk, cybernews, cybersecurity framework, cybersecurity meaning, cyberuk, definition of cyber security, diploma in cyber security, data science for cyber security, data security report, define cyber, define secure, define security, digital security, digital security definition, egypt cyber security, electric grid cyber security, entry level cyber security salary, eset cyber security, eset cyber security & mac virus protection, estonia cyber security strategy, evolution of cyber security, examples of cyber security threats, features of cyber security, explain computer security, explain cyberspace, famous cyber security quotes, fbi cyber security, freelance cyber security salary, fundamentals of cyber security, futurelearn cyber security, gchq 10 steps to cyber security, global cyber security, gdpr and cyber security, government cyber security, how does cyber security affect you, how does cyber security work, how to do cyber security, how to get a job in cyber security uk, how to get into cyber security, how to get into cyber security uk, how to protect cyber security, importance of cyber security, industrial cyber security, information and cyber security, information security, information security and cyber security, information security cyber security, information security or cybersecurity, information security versus cyber security, information security vs cybersecurity, internet cyber security, iot cybersecurity, is it cyber security or cybersecurity, israel cyber security, it cyber security, it security, latest cyber security threats, latest cybersecurity news, logo cyber security, mobile cyber security, mooc cyber security, national cyber security, national cyber security centre, national cyber security centre uk, national cyber security programme, need of cyber security, network and cyber security, nist cybersecurity, ot cyber security, pbs cyber security, personal cyber security services, phd cyber security uk, phd in cyber security uk, general dynamics cyber security, germany cyber security strategy, getting started in cyber security, global cyber security response team, gmu cyber security, private cyber security, gov uk government, recent cyber security attacks, reddit cybersecurity, gsi uk government, gulshan rai national cyber security, higher apprenticeships cyber security, home cyber security, home office cyber crime, homeland security cyber crime, how much does cyber security pay, how to improve cyber security, hp cyber security, humans are the weakest link in cyber security, ibm cyber security, scada cyber security, significance of cyber security, silence cybersecurity, ics cyber security conference, small business cyber security, india cyber security strategy, industrial control systems cyber security, starting a cyber security company, information security articles, information security definition, information security framework, information security infrastructure, information security news, information technology and cyber security, insider threats in cyber security, institute of cyber security, internet cyber, internet cyber attack, internet security standards, is a cyber security degree worth it, is a degree in cyber security worth it, is cyber security a good major, is cybersecurity one word, isac cyber security, top 10 cyber security threats, top companies for cyber security, top cyber security, top cyber security experts, top cybersecurity companies, top uk universities for cyber security, top us cyber security companies, trump cybersecurity, ttp cyber security, ttps cyber security, types of cyber attacks, types of cyber security, udemy cyber security, uk cyber security forum, uk cyber security law, uk cyber security legislation, uk cyber security market, uk cyber security strategy, uk government cyber security, uk government cyber security strategy, uk national cyber security centre, uk national cyber security strategy, understanding cyber security, it security fields, us cyber security, it security news, us department of cyber security, japan cyber security, jp morgan cyber security, jp morgan cyber security salary, junior cyber security consultant, kaspersky cyber security, kingston university cyber security, kpmg cyber security challenge, latest information security breaches, learn cyber security online, what cyber security do, leonardo cyber security, what degree for cyber security, what do cyber security do, list of cyber security risks, what do you do in cyber security, what do you learn in cyber security, machine learning cyber security, what does cyber security do, what does cyber security mean, maritime cyber security, masters degree cyber security, masters in cyber security in canada, masters in cyber security online, masters in cyber security sydney, mcafee cyber security, what is a cyber security engineer, msc cyber security in india, national college of cyber security, national cyber centre, national cyber security center, what is cyber security, national cyber security month, what is cyber security all about, national cyber security service, what is cyber security and why is it important, what is cyber security definition, national security centre, what is cyber security risk, national security office, nca cyber crime, ncsc org uk, network security standards, new technology to improve cyber security, nist cybersecurity framework, nist cybersecurity maturity model, nist framework, nova cyber security, odu cyber security, offensive cyber security, oil and gas cyber security, online bachelors degree cyber security, online cyber security masters, online cyber security masters degree, online cyber security training for employees, online security, online security wikipedia, oxford cyber security centre, paladin cyber security, why cyber security, pc security, why is cyber security important, working in cybersecurity, poland cyber security, publicly traded cyber security companies, qinetiq cyber security, r cybersecurity, recent cyber security incidents, recent network threats, red team cyber security, risk assessment cyber security, rolls royce cyber security, royal holloway cyber security, sans cyber security, sans security framework, sap cyber security, scotland yard cyber crime unit, secure london gov, security, security attack definition, security for computer, security forums uk, security in ict, security measures wikipedia, security national number, security news, security policy in cyber security, security tools definition, sevin cyber security, short essay on cyber security, state of cyber security 2017, station x cyber security, system security, taiwan cyber security, target cyber security, top cyber security universities, turkey cyber security, types of cyber security threats, uk cyber defence, uk security, uk security news, united states cyber security, university of maryland university college cyber security, university of west london cyber security, washington university cyber security, what degree is needed for cyber security, what does cyber mean, what is a security framework, what is computer security, what is cyber, what is cyber forensics and information security, what is cyber security pdf, what is cyber security salary, what is cyberspace, why is cybersecurity important, windows cyber security