Do you know what cyber attacks are and how to protect your environment?
Vers?o em Português: https://www.dhirubhai.net/pulse/voc%C3%AA-sabe-o-que-s%C3%A3o-ataques-cibern%C3%A9ticos-e-como-seu-pinto-freire/?published=t
With the advent of the Internet and technology growth around the world, the environment where professionals who are able to work with cyber security have become very important. But what is a cyber attack? It can defined as any kind of offensive maneuver turned into a system of information, infrastructure, computer networks, Data Center, enterprise, government, hospital, embedded devices or personal devices. Normally, one attack is organized by a group or one hacker. There are several way to attacks, for example, infection of virus, malware, stopped services, exfiltration of data on the internet and others. Probably you have already heard about it or you have known someone who has already fallen for this. These are some of the cyber attacks practiced by hackers with the goal of infecting, damaging or stealing important information from bussiness enterprises.
Many organizations process and store a big quantity of confidential information on servers, and send these data through network to other places around world. With data volume growth and sophistication of cyber attacks, it is necessary to pay attention to this in order to protect the bussiness and people information, well as safeguard the security. To prevent cyber attacs from happening, it is necessary to invest in both private and public cyber security institutions.
The sector of Information of Technology still needs to be more prepared to confront this new demand, and ensure that enterprises and clients feel safe, because bussinessess and finance will not be impacted. It is essential for the enterprise to invest in modern information security practices focusing on prevention through correction. Making investments such as antivirus, firewall, DLP, SIEM, IPS/IDS, WAF is crucial, however, creation of policies of information security that aware their teams, creating one culture of security inside the environment.
Protect an enterprise against cyber threats requires monitoring the infrastructure of security constantly and activities of critical information. The base to protect one network is collecting and analysing in real time thousands of security logs generated by activities of a network. But this is only the beginning of the process. To perform effective detection and response to threats, it is necessary to count on mature procedures and advanced technology of analysis. Beside of a fundamental stage of screening that evaluates each alert, their potential of threat and so on. Prioritize incidents for necessary and effective reaction. We can say that information security is directily related with protection of an amount of information, in order to preserve the value it has to a person or an organization. Always remember that we should focus on the base of information security: Confidentiality, Integrity and Availability.
Let's debate.
Text was review by teacher Paulo D'Aquino
Multimedia | EU Lobbying | Apple Feature in Digital Video | digital forensic | Master Criminal Profiling | CEH | Blockchain | Artist | Fighting Cybercrime!
6 年Congratulations!!!
Information Security Coordinator / Consultant / Analyst
6 年Congratulations!!! The explorations of this subject is always very welcome, because it is our daily life.
Doctor of Information Assurance -Technology Risk Manager - Information Assurance, and AI Governance Advisor - Adjunct Professor UoF
6 年In an increasingly interconnected world, the fate of the community is strongly influenced by the behavior of the individual and it is therefore important for everyone to make their own part properly.
Analyst
6 年Think this is great!? Will be great to see you elaborate down road as Siva suggested.
Good one zozi? it explains the base of the cybersecurity but try to elaborate some new methods used recently in the next article.