Cybersecurity

Cyber attacks are increasing in frequency while the size of the target is becoming much larger and the social importance raising the critical need for cybersecurity.

Cybersecurity is increasingly becoming a hot topic.  With recent hacks on the Colonia Pipeline and JBS, the world’s largest meat producer, the US Government is encouraging businesses to protect their systems and customers.

Cybersecurity may also be referred to as computer security, information technology, or IT security.  It is protecting networks, computers, network servers, or devices from unauthorized information disclosure.  This is done by obtaining the information by disruption or misdirection of services provided.

The world has become reliant on computer systems, the Internet, wireless networks, and network standards such as Bluetooth and Wi-Fi.  The demand and use of smartphones, televisions, and other devices create more opportunities for hackers, increasing the risk for businesses and consumers.

The NSA (National Security Agency) is responsible for protecting U.S. information systems while collecting foreign intelligence.  The actions the NSA is responsible for the protection and defense of information.  The NSA is one of America’s biggest secrets with very little transparency to “protect.”

Protecting US systems and information includes evaluating software, identify security flaws while taking steps to correct the flaws.

The defense action is to collect intelligence comes from discovering security flaws to retrieve the information.  However, correcting the flaws prevents the NSA from being able to collect their intelligence creating a conflict.

Common vulnerabilities and attacks:

  1. Backdoor
  2. Denial-of-service attack
  3. Direct-access attacks
  4. Eavesdropping
  5. Multi-vector, polymorphic attacks
  6. Phishing
  7. Privilege escalation
  8. Reverse engineering
  9. Social engineering
  10. Spoofing
  11. Tampering
  12. Malware
  13. More possibly exist

Additional citations will be added soon – worked in progress.

NOTES: we “intend” to create easy-to-read content that normal business owners are comfortable reading to learn more about this increasingly necessary action to protect their business.  While it is intended to serve as a summary, it is a large topic to reduce to a summary.

Links:

  1. Wikipedia – Cybersecurity
  2. Home
  3. Sitemap