Cyber Security - The KEY Infrastructure

Cyber Security - The KEY Infrastructure

It's a familiar scene from a blockbuster movie. The hero races against time to tackle the bad guys intent on taking down some form of critical national infrastructure – let's say a nuclear power plant. With seconds to spare, the hero saves the day, usually dispatching the evil plotters and lightening the mood with a quick one liner.

This may seem like an unusual scenario, but the reality is our critical national infrastructure is under a more insidious and arguably dangerous form of attack each day. Already, there is a real threat that the vulnerabilities of critical national infrastructures could fall into the wrong hands.?


Government Cyber Security

Experts have long warned that these systems are vulnerable to physical attack by extremists, but now governments are warning the sensitive computer systems that maintain these networks are increasingly being attacked by hackers. These sophisticated and well funded criminals ultimately look to attack companies through any vulnerability- such as inserting harmful malware on a company network. This malware may quietly collect sensitive information as it traverses the network, harvest users' Internet sessions looking for passwords, send corporate documents or databases to cybercriminals outside the party, or simply sit waiting for an external trigger to take a particular action such as deleting critical business information.

Eventually, this malware could be used to take control of the world's large scale industrial control systems such as power plants and dams – eventually even extending to transport.


Cybercrime Software

Today, most companies now understand sophisticated cyber-criminals have rendered traditional perimeter defences, like firewalls, VPNs, and antivirus and malware tools ineffective. It's crucial these organisations now take a holistic approach to cyber security and stop trying to fight new professional criminals with perimeter security alone. Firewalls are important when keeping out known threats, but they are only one tool against increasingly professional cyber criminals prepared to use any means possible to beach a network.


Cyber Threat Analytics

Cybercriminals need a vulnerability to exploit and time to exploit it. The process of exploring a victims network leaves traces in network-activity logs, and these traces can be picked up with the right security-analytics approach.

Cyber Threat Analytics can identify cyber breaches that have already compromised defences and now lay hidden inside the network.

Whereas conventional security solutions look for signs of malware code, security-analytics techniques monitor network activity for telltale signs of cybercriminal behaviour. This activity might be documented within the logs of security software, network hardware devices, or user behaviour – all holding essential information that forms a powerful body of evidence that companies can leverage to fight back against unwanted intruders.

It does this by rapidly ingesting and processing these network logs using advanced machine learning techniques. It helps organisations baseline normal network activity, then quickly detect anomalies that suggest criminal activity is occurring.

Gaining a new understanding of normal is key to addressing the abnormal – and good information is fundamental to making this happen. Using analytics to uncover anomalies hidden within the network allows organisations to act early in the threat timeline, before extensive damage can be done, or even control loss of these critical systems.


#cybersecurity #internet #hightech #data #itsallaboutEVOLUTION

要查看或添加评论,请登录

Jayme Bianco的更多文章

  • Google GO GREEN!

    Google GO GREEN!

    The company claims to have eliminated its entire ‘carbon legacy.’ As of today, Google has eliminated its entire “carbon…

  • Here’s a question you should ask about every climate change plan

    Here’s a question you should ask about every climate change plan

    Bill Gates "I get to learn about lots of different plans for dealing with climate change. It’s part of my job—climate…

  • What Does Google Know About You?

    What Does Google Know About You?

    Data is what fuels the information economy. And while there are many varieties of data clogging up the internet’s…

  • Strategie (e motivazioni) per un uso sostenibile dello smartphone

    Strategie (e motivazioni) per un uso sostenibile dello smartphone

    Analizzando centinaia di testimonianze, un gruppo di ricercatori ha individuato le quattro principali motivazioni che…

  • GLOBAL TALENT TRENDS

    GLOBAL TALENT TRENDS

    The 2019 LinkedIn Global Talent Report brings to light the ever-growing importance of soft skills – “where machines…

  • ... next step EVOLUTION

    ... next step EVOLUTION

    The principles and organizational models that we use today, based on the concepts of industrial society, which moves at…

  • SUPERNOVA

    SUPERNOVA

    Are we really all made of stardust? YES! YES! We are all made of stardust. It sounds like a line from a poem, but there…

  • The next clash of Silicon Valley titans will take place in SPACE

    The next clash of Silicon Valley titans will take place in SPACE

    Like one of those comic book supervillain crossovers where The Joker meets Lex Luthor or Doctor Doom takes on Magneto…

  • The world’s most valuable resource is no longer oil, but data

    The world’s most valuable resource is no longer oil, but data

    A NEW commodity spawns a lucrative, fast-growing industry, prompting antitrust regulators to step in to restrain those…

  • O país do FUTURO!

    O país do FUTURO!

    A few days ago listening to the radio Cultura FM of S?o Paulo, I become aware of countless facts about a great icon of…

社区洞察

其他会员也浏览了