Cybersecurity Essay
Cybersecurity Essay
Cybersecurity Essay
The connected electronic information network has become an integral part of our
daily lives. All types of organizations such as medical, financial and educational
institutions use this network to function effectively. They use the network to collect,
process, store and share large amounts of digital information. As more digital
information is collected and shared, protecting this information becomes even more
important to our national security and economic stability.
Cybersecurity is the constant effort to protect these network systems and all data
from unauthorized use or damage. On a personal level, you must protect your
identity, your data, and your computing devices. At the corporate level, it is
everyone's responsibility to protect the organization's reputation, data, and
customers. At the state level, national security, and the safety and well-being of
citizens, are at stake.
Knowing this concept we can go a little deeper into the topic and talk about the
attackers and how they are divided according to their activities.
First of all, we must know what attackers are, these are defined as people or
groups that try to take advantage of vulnerabilities for personal or financial gain.
Attackers are interested in everything from credit cards to product designs and
anything else of value. Some types of cyber attackers are known as:
Any information about you can be considered your data. This personal information
may uniquely identify you as an individual. This data includes the images and
messages you exchange with your family and friends online. Other information,
such as your name, social security number, date and place of birth, or your
mother's last name, is known to you and is used to identify you. Information such
as medical, educational, financial, and employment information may also be used
to identify you online.
computing devices
Your computing devices don't just store your data. Now these devices have
become the portal to your data and generate information about you.
Unless you have selected to receive paper statements for all of your accounts, you
use your computing devices to access the data. If you want a digital copy of your
latest credit card statement, use your computing devices to access the credit card
issuer's website. If you want to pay your credit card bill online, you access your
bank's website to transfer the funds with your computing devices. In addition to
allowing you to access your information, computing devices can also generate
information about you.
With all this information about you available online, your personal data has become
profitable for hackers.
Your computing devices store your data and are the portal to your online life. The
following is a short list of steps to follow to protect your computing devices from
intrusions:
Manage your operating system and browser: Hackers are always trying to
exploit vulnerabilities in your operating systems and web browsers. To protect
your computer and data, set the security settings on your computer or browser
to medium or high. Update your computer's operating system, including web
browsers, and periodically download and install software patches and security
updates from vendors.
Protect all your devices: Your computing devices, whether PCs, laptops,
tablets or smartphones, should be password protected to prevent
unauthorized access. Stored information must be encrypted, especially in the
case of sensitive or confidential data. On mobile devices, store only
information necessary in case of theft or loss when you are away from home.
If any of your devices are compromised, criminals can access all your data
through your cloud storage service provider, such as iCloud or Google Drive.
Your online credentials are valuable. These credentials give thieves access to your
accounts. You may think that purchased frequent flyer miles are worthless to
cybercriminals, but you'll need to reconsider this statement. After approximately
10,000 American Airlines and United accounts were hacked, cybercriminals were
booking free flights and upgrades with these stolen credentials. Although frequent
flyer kilometers were returned to customers by airlines, this demonstrates the value
of login credentials. A criminal could also take advantage of your relationships.
They can access your online accounts and reputation to trick you into transferring
money to your friends or family. The criminal may send messages stating that your
family or friends need you to transfer money to them so they can return from
abroad after losing their wallets.
Criminals are very imaginative when trying to trick you into giving them money.
They don't just steal your money; They can also steal your identity and ruin your
life
They want their identity
In addition to stealing your money for short-term monetary gain, criminals want to
make long-term gains by stealing your identity.
As medical costs rise, medical identity theft also increases. Identity thieves can
steal your health insurance and use your health benefits for themselves, and these
medical procedures are now in your medical records.
Annual tax filing procedures may vary from country to country; However,
cybercriminals see this as an opportunity. For example, people in the United States
need to file their taxes by April 15 of each year. The Internal Revenue Service
(IRS) does not flag tax returns against employer information until July. An identity
thief can generate a false tax return and collect the refund. Legitimate users will
notice when their refunds are rejected by the IRS. With the stolen identity, they can
also open credit card accounts and rack up debts in your name. This will cause
damage to your credit rating and make it more difficult for you to obtain loans.
Personal credentials can also allow access to corporate and government data.
Traditional data
With the rise of the Internet of Things (IoT), there is much more data to manage
and secure. The IoT is a large network of physical objects, such as sensors and
equipment, that extends beyond the traditional computer network. All of these
connections, plus the fact that we have expanded storage capacity and services
through the cloud and virtualization, lead to exponential data growth. This data has
created a new area of interest in technology and business called “big data.” With
the speed, volume and variety of data generated by IoT and daily business
operations, the confidentiality, integrity and availability of this data are vital to the
survival of the organization.
Confidentiality, integrity and availability, known as the CID triad (Figure 1), is a
guide to an organization's IT security. Confidentiality ensures data privacy by
restricting access with authentication encryption. Integrity ensures that information
is accurate and reliable. Availability ensures that information is available to
authorized people.
Confidentiality
Another term for confidentiality would be privacy. Company policies should restrict
access to information to authorized personnel and ensure that only authorized
people will see this data. Data can be divided into sections based on the level of
security or sensitivity of the information. For example, a Java developer should not
have access to the personal information of all employees. Additionally, employees
should be trained to understand best practices for safeguarding sensitive data to
protect themselves and the company from attacks. Methods to ensure
confidentiality include encryption of data, username and password, two-factor
authentication, and minimizing exposure of sensitive information.
Integrity
Integrity is accuracy, consistency, and reliability of data throughout its lifecycle. The
data must remain unchanged during transfer and must not be modified by
unauthorized entities. File permissions and user access control can prevent
unauthorized access. Version control can be used to prevent accidental changes
by authorized users. Backups must be available to restore corrupted data, and the
hash checksum can be used to verify data integrity during transfer.
The checksum is used to verify the integrity of files, or strings of characters, after
they have been transferred from one device to another over your local network or
the Internet. Checksums are calculated with hash functions. Some of the common
checksums are MD5, SHA-1, SHA-256, and SHA-512. A hash function uses a
mathematical algorithm to transform data into a fixed-length value that represents
the data, as shown in Figure 2. The hash value is only there for comparison. From
the hash value, the original data cannot be recovered directly. For example, if you
forgot your password, your password cannot be recovered from the hash value.
The password must be reset.
After downloading a file, you can verify its integrity by comparing the source's hash
values with the one you generated with any hash calculator. By comparing hash
values, you can ensure that the file has not been altered or damaged during the
transfer.
Availability
Attacks can originate within an organization or outside it, as shown in the figure. An
internal user, such as an employee or contracted partner, may accidentally or
intentionally:
Internal threats also have the potential to cause greater damage than external
threats, because internal users have direct access to the building and its
infrastructure devices. Employees also have knowledge of the corporate network,
its resources and its sensitive data, as well as different user levels or administrative
privileges.
External threats from amateurs or expert attackers can attack vulnerabilities in the
network or computing devices, or use social engineering to gain access.
The consequences of a security breach
Protecting organizations against any possible cyberattack is not feasible, for some
reasons. The expertise required to set up and maintain your secure network can be
expensive. Attackers will always continue to find new ways to target networks.
Over time, an advanced and targeted cyberattack will succeed. The priority then
will be how quickly your security team can respond to the attack to minimize data
loss, downtime and lost revenue.
You now know that anything posted online can live online forever, even if you
managed to delete all copies in your possession. If your servers were attacked,
sensitive staff information could become public. A hacker (or hacking group) can
vandalize the company's website by posting false information and ruining the
reputation of the company that took years to create. Hackers can also take down a
company's website and cause it to lose revenue. If the website is left inactive for
longer periods of time, the company may appear unreliable and possibly lose
credibility. If the company's website or network has had a security breach, this
could lead to the leak of confidential documents, the disclosure of trade secrets,
and the theft of intellectual property. The loss of all this information can impede the
growth and expansion of the company.
The monetary cost of an attack is much greater than simply replacing lost or stolen
devices, investing in existing security, and strengthening the physical security of
the building. The company will be responsible for contacting all customers affected
by the breach and may need to prepare for legal proceedings. With all this
confusion, employees may choose to leave the company. The company may need
to focus less on growth and more on repairing its reputation.
While most successful businesses today are aware of common security issues and
put great effort into preventing them, no set of security practices is 100% efficient.
Since a security breach is likely to occur if the prize is large, companies and
organizations must also be prepared to contain the damage.
It is important to understand that the impact of the security breach is not only
related to the technical aspect, stolen data, damaged databases or damage to
intellectual property; The damage also extends to the company's reputation.
Responding to a data breach is a very dynamic process.
Below are some important steps a company should take when it identifies a
security breach, according to many security experts:
Communicate the problem. Internally inform employees of the problem and
call them to action. Externally inform customers through direct communication
and official announcements. Communication creates transparency, which is
crucial for this type of situation.
Provide details. Explain why the situation occurred and what was affected. The
company is also expected to cover the costs of identity theft protection
services for affected customers.
Understand what caused and facilitated the security breach. If necessary, hire
computer forensic experts to investigate and find out the details.
Ensure all systems are clean, no backdoors have been installed, and nothing
else is compromised. Attackers will often try leaving a backdoor to facilitate
future breaches. Make sure this doesn't happen.
High-tech children's toy maker Vtech suffered a security breach in its database in
November 2015. This security breach could affect millions of customers around the
world, including children. The data breach exposed sensitive information, including
customer names, email addresses, passwords, images, and chat logs.
Toy tablets had become a new target for hackers. Customers had shared photos
and used chat functions on the toy tablets. The information was not properly
secured, and the company's website did not support secure communication with
SSL. Although the security breach did not expose any credit card information or
personally identifiable data, the company was suspended from the stock exchange
due to concerns about the immensity of the attack.
Vtech did not properly protect customer information and it was exposed during the
security breach. Although the company informed its customers that their
passwords had been encrypted, it was still possible for hackers to crack them. The
passwords in the database were encrypted using the MD5 hash function, but the
security questions and answers were stored in clear text. Unfortunately, the MD5
hash function has known vulnerabilities. Hackers can determine original passwords
by comparing millions of previously calculated hash values.
With the information exposed in this data breach, cybercriminals were able to use it
to create email accounts, apply for credit, and commit crimes before children were
old enough to go to school. As for the parents of these children, cybercriminals
were able to take over online accounts because many people reuse passwords
across various websites and accounts.
The security breach not only affected the privacy of customers, but also ruined the
company's reputation, as indicated by the company when its presence on the stock
exchange was suspended.
For parents, it is a wake-up call to be more careful about their children's privacy
online and request better security for children's products. As for manufacturers of
network-connected products, they must be more aggressive in protecting customer
data and privacy now and in the future, as the cyberattack landscape evolves.
Security vulnerabilities
Security vulnerabilities are any type of defect in software or hardware. After gaining
knowledge about a vulnerability, malicious users attempt to exploit it. An attack is
the term used to describe a program written to exploit a known vulnerability. The
act of exploiting a vulnerability is known as an attack. The goal of the attack is to
access a system, the data it hosts, or specific resources.
Software vulnerabilities
Hardware vulnerabilities
Hardware vulnerabilities are specific to device models and are generally not
targeted by random compromise attempts. While hardware vulnerabilities are more
common in highly targeted attacks, traditional malware protection and physical
security are sufficient to protect the average user.
Most software security vulnerabilities fall into one of the following categories:
Buffer Overflow: This vulnerability occurs when data is written beyond the limits of
a buffer. Buffers are areas of memory allocated to an application. By changing data
beyond the boundaries of a buffer, the application accesses memory allocated to
other processes. This can lead to a system crash, data compromise, or escalation
of privileges.
Unvalidated input: Programs often work with data entry. This data entering the
program may contain malicious content designed to cause the program to behave
in unwanted ways. Consider a program that receives an image for processing. A
malicious user could create an image file with invalid image dimensions.
Maliciously created dimensions could force the program to allocate buffers of
incorrect and unexpected sizes.
Access control issues: Access control is the process of controlling who does
what, from managing physical access to computers to determining who has access
to a resource, such as a file, and what they can do with it. , how to read or modify
it. Many security vulnerabilities are generated by the incorrect use of access
controls.
Almost all access controls and security practices can be bypassed if the attacker
has physical access to the targeted computers. For example, no matter whether
you have set permissions on a file, the operating system cannot prevent someone
from bypassing the operating system and reading the data directly from the disk.
To protect the equipment and the data contained therein, physical access must be
restricted and encryption techniques must be used to protect the data from theft or
damage.
What is cyber warfare?
Additionally, compromised sensitive data can give attackers the ability to blackmail
personnel within the government. The information may allow an attacker to
impersonate an authorized user to access sensitive information or the computer.
If the government cannot defend itself from cyber attacks, citizens may lose
confidence in the government's ability to protect them. Cyberwarfare can
destabilize a nation, disrupt commerce, and affect citizens' faith in their
government without physically invading the target country.
Cybersecurity professionals must have the same skills as hackers, especially Black
Hat hackers, to offer protection against attacks. One difference between a hacker
and a cybersecurity professional is that the cybersecurity professional must work
within legal boundaries.
Cybersecurity professionals develop many skills that can be used for good or evil.
Those who use their skills within the legal system, to protect infrastructure,
networks and privacy are always in high demand.
Most countries have some cybersecurity laws. They may be related to critical
infrastructure, networks, and corporate and individual privacy. Companies must
comply with these laws.
In some cases, if you violate cybersecurity laws while doing your job, the company
may be punished and you could lose your job. In other cases, you could be
prosecuted, fined and possibly convicted.
Generally, if you are in doubt about whether an action or behavior may be illegal,
assume that it is illegal and do not do it. Your company may have a legal
department or someone from the Human Resources department who can answer
your question before you do something illegal.
A person can act unethically and not be subject to legal process, fines, or
imprisonment. This is because the action may not have been technically illegal. But
that doesn't mean the behavior is acceptable. Ethical behavior is very easy to
verify. It is impossible to list all the different unethical behaviors that someone with
cybersecurity skills can exhibit. Below we present just two. Ask yourself the
following questions:
Would I like to find out that someone hacked my computer and altered the
images on my social networking sites?
If you answer 'no' to any of these questions, then don't do those things to others.
Ethics represents the codes of behavior that are sometimes enforced by laws.
There are many areas in cybersecurity that are not covered by laws. This means
that doing something that is technically legal may still be unethical. Because many
areas of cybersecurity are not (or not yet) covered by law, many professional IT
organizations have created codes of ethics for those in the sector.
Present
IoT (Internet of Things) devices pose an even greater risk than other electronic
devices. While desktop computers, laptops, and mobile devices receive frequent
software updates, most IoT devices still have their original firmware. If
vulnerabilities are found in the firmware, the IoT device is likely to remain
vulnerable. To make the problem worse, IoT devices are designed to connect to
the provider's servers (call home) and request Internet access. To access the
Internet, most IoT device manufacturers rely on the customer's local network. The
result is that IoT devices are very prone to being compromised and, when
compromised, allow access to the customer's local network and its data. The best
way to protect yourself from this situation is to have IoT devices with an isolated
network shared only with other IoT devices.
Conclusions