Cybersecurity

0 38
Avatar for ApolloX
3 years ago
Topics: Cybersecurity

What is Cyber Security?

-Cybersecurity, also known as information technology security (IT security), is the safeguarding of computer systems and networks against data leakage, fraud, or harm to their hardware, software, or electronic data, as well as interruption or misdirection of services.

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as cyber security. It's also referred to as information technology security or electronic data security. The term is used in a variety of contexts, ranging from business to mobile computing, and can be classified into a few general categories.

1. Network security- is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

2. Application security- is concerned with keeping software and devices safe from threats. A compromised application may allow access to the data it is supposed to protect. Security begins in the design stage, long before a program or device is deployed.

3. Information security- protects the integrity and privacy of data, both in storage and in transit.

4. Operational security- The procedures and decisions used to handle and secure data assets are referred to as operational protection. The processes that decide how and where data can be stored or exchanged, as well as the permissions users have when accessing a network, all fall under this umbrella.

Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event. Business continuity is the plan the organization falls back on while trying to operate without certain resources.

End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally introduce a virus to an otherwise secure system by failing to follow good security practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.

Example of Cybersecurity

Spear Phishing 

Hackers often use a company’s vulnerabilities to set up sophisticated phishing scams, known as spear phishing. Unsuspectingly, they convince employees to give up valuable information and even large sums of money before they realize something isn’t right.

This is the story of a client who was targeted for this kind of attack and how extensive the damage can be. One of the users in the accounting department received a phishing email, which was obviously fake to security experts, but to the average person seemed legitimate. The person clicked on a link which downloaded a file onto their computer, enabling the attackers to watch the employee’s inbox and develop a profile for the company. Once they developed their profile and had a good understanding of who signed the checks, they went to work, requesting money to be wired to a foreign bank.

Fortunately, while the money was being prepared to be wired, we were able to discern what was going on and stop the transfer from happening. However, the hackers were able to breach several of the company’s clients who also were compromised. Attacks like this don’t stop at one victim, they catalog as many victims as they can, working down the client chain.

The role of Information Communication Technology to Social Change

-Information and communication technologies (ICT) play a significant role in all aspects of modern society. ICT have changed the way in which we communicate with each other, how we find needed information, work, conduct business, interact with government agencies, and how we manage our social lives. As ICT affect everyday lives, they also impact the macroeconomic growth, which in turn further affects society by enabling infrastructure and standard of living improvements.

Although the concept of ‘socioeconomic development' is widely applied in research and in practice, its meaning may not always be clear. The word ‘development' implies progress or advance, and may be defined as the overall activity in a society, consciously or subconsciously undertaken, aimed at improvements in that society.

The qualifier ‘socioeconomic,' itself a combination of two words, relates to social factors, like education, and profession, as well as economic factors, like income and resources. Thus socioeconomic development can be defined as a process of changes or improvements in social and economic conditions as they relate to an individual, an organization, or society as a whole.

Information and communication technology (ICT) has contributed immensely to social and economic improvements, such as higher employment and productivity, increasing access to a higher quality of life. ICT incorporates electronic technologies and techniques used to manage information and knowledge, including information-handling tools used to produce, store, process, distribute and exchange information. Benefits of ICT can be achieved directly, through improved healthcare provision and disease prevention, or indirectly, through improved social infrastructure, economic growth, or other broader determinants of population health. In the context of public health, ICT, if properly designed and implemented, can generate many positive outcomes: improved access for communities in rural or remote areas; support of healthcare professionals; real-time disease surveillance; data sharing; and data capture, storage, interpretation, and management.

How do Technological Change affects the economy of the country

-Technology has had a profound effect on the global economy, and its implementation has been linked to market shifts, higher living standards, and stronger international trade. Technology has dramatically improved practices while also lowering running costs.

THE EFFECTS OF TECHNOLOGICAL CHANGE ON THE GLOBAL ECONOMY are causing massive changes in the way businesses and countries coordinate production, exchange goods, spend resources, and create new products and processes. Global enterprises' far-flung operations will communicate instantly thanks to sophisticated information technology. Construction and communications are two industries that have benefited from new materials. Long-standing trends of production and employment have been disrupted by advanced manufacturing developments. The global movement of people and commodities has been significantly increased by improved air and sea transportation.

The consequences for developed countries would be massive. Third-world countries can turn their raw materials and resources into value-added goods with the aid of emerging technology, accelerating economic growth without causing dysfunction. It is the developing country's obligation.

North America, Western Europe, and Japan are at the forefront of technological globalization. Despite their influence in forming a new global competition trend, each has its own set of problems. Despite becoming a pioneer in developing emerging technology, the United States is grappling with massive budget and trade deficits, as well as the deindustrialization in conventional economic sectors. Japan's economy is too reliant on exports, despite the fact that it has had great success commercializing new technologies. Western Europe has the cultural heritage and a core of excellent research groups to support its technological leadership, but it lacks the stability needed to develop strategic initiatives in key sectors.

At the national level, the government plays a critical role in technology issues. As policymakers have understood the effect of technology on global events, technology has now become a part of almost every political debate. Governments control and leverage technological advances in a variety of ways, including legislation, procurement, protectionist policies, and Research and Development (R&D) funding.

1
$ 0.00
Avatar for ApolloX
3 years ago
Topics: Cybersecurity

Comments