Do you know what cyber attacks are and how to protect your environment?
credit of the picture: https://hackernoon.com/the-new-global-center-for-cybersecurity-5f5bae03f113

Do you know what cyber attacks are and how to protect your environment?

Vers?o em Português: https://www.dhirubhai.net/pulse/voc%C3%AA-sabe-o-que-s%C3%A3o-ataques-cibern%C3%A9ticos-e-como-seu-pinto-freire/?published=t

With the advent of the Internet and technology growth around the world, the environment where professionals who are able to work with cyber security have become very important. But what is a cyber attack? It can defined as any kind of offensive maneuver turned into a system of information, infrastructure, computer networks, Data Center, enterprise, government, hospital, embedded devices or personal devices. Normally, one attack is organized by a group or one hacker. There are several way to attacks, for example, infection of virus, malware, stopped services, exfiltration of data on the internet and others. Probably you have already heard about it or you have known someone who has already fallen for this. These are some of the cyber attacks practiced by hackers with the goal of infecting, damaging or stealing important information from bussiness enterprises.

Many organizations process and store a big quantity of confidential information on servers, and send these data through network to other places around world. With data volume growth and sophistication of cyber attacks, it is necessary to pay attention to this in order to protect the bussiness and people information, well as safeguard the security. To prevent cyber attacs from happening, it is necessary to invest in both private and public cyber security institutions.

The sector of Information of Technology still needs to be more prepared to confront this new demand, and ensure that enterprises and clients feel safe, because bussinessess and finance will not be impacted. It is essential for the enterprise to invest in modern information security practices focusing on prevention through correction. Making investments such as antivirus, firewall, DLP, SIEM, IPS/IDS, WAF is crucial, however, creation of policies of information security that aware their teams, creating one culture of security inside the environment.

Protect an enterprise against cyber threats requires monitoring the infrastructure of security constantly and activities of critical information. The base to protect one network is collecting and analysing in real time thousands of security logs generated by activities of a network. But this is only the beginning of the process. To perform effective detection and response to threats, it is necessary to count on mature procedures and advanced technology of analysis. Beside of a fundamental stage of screening that evaluates each alert, their potential of threat and so on. Prioritize incidents for necessary and effective reaction. We can say that information security is directily related with protection of an amount of information, in order to preserve the value it has to a person or an organization. Always remember that we should focus on the base of information security: Confidentiality, Integrity and Availability.

Let's debate.

Text was review by teacher Paulo D'Aquino

? SILVIA MARTINEZ YENES ??

Multimedia | EU Lobbying | Apple Feature in Digital Video | digital forensic | Master Criminal Profiling | CEH | Blockchain | Artist | Fighting Cybercrime!

6 年

Congratulations!!!

回复
Jance Luiz

Information Security Coordinator / Consultant / Analyst

6 年

Congratulations!!! The explorations of this subject is always very welcome, because it is our daily life.

回复
John Giordani, DIA

Doctor of Information Assurance -Technology Risk Manager - Information Assurance, and AI Governance Advisor - Adjunct Professor UoF

6 年

In an increasingly interconnected world, the fate of the community is strongly influenced by the behavior of the individual and it is therefore important for everyone to make their own part properly.

Think this is great!? Will be great to see you elaborate down road as Siva suggested.

Good one zozi? it explains the base of the cybersecurity but try to elaborate some new methods used recently in the next article.

要查看或添加评论,请登录

Zoziel P.的更多文章

  • From the Zero to Malware Discovery

    From the Zero to Malware Discovery

    Hello people, I was with some time, and I decided to made an analysis using some tools that I commented last post…

    29 条评论
  • Windows Analysis Tips and Tools

    Windows Analysis Tips and Tools

    Hi people, I found some old notes, but useful that I use during an incident, and I decided to share these tools and…

    14 条评论
  • Ransomware is not just a threat, it's a crisis waiting to happen...

    Ransomware is not just a threat, it's a crisis waiting to happen...

    Although I haven't posted anything here, I wanted to share my thoughts on my favorite wicked malware: ransomware. To…

    21 条评论
  • Analyzing Steal Bank Account with Malicious PDF

    Analyzing Steal Bank Account with Malicious PDF

    Hi everyone, as have time I don't post anything, I decided to write one more analysis about stolen bank accounts and…

    11 条评论
  • Analise de arquivos maliciosos - Exemplo 01

    Analise de arquivos maliciosos - Exemplo 01

    English Version O intuito dessa série de artigos é exibir analises de exemplos de arquivos maliciosos que apresentei…

    13 条评论
  • Malicious file analysis - Example 01

    Malicious file analysis - Example 01

    My objective with this series of articles is to show an analysis of examples of malicious files that I presented during…

    3 条评论
  • Analisando ataques de phishing que usam PDFs maliciosos

    Analisando ataques de phishing que usam PDFs maliciosos

    Todos os dias nós recebemos muitos ataques de phishing com documentos(Word, Excel) ou PDFs maliciosos. Resolvi dar uma…

    11 条评论
  • Analyzing Phishing attacks that use malicious PDFs

    Analyzing Phishing attacks that use malicious PDFs

    Portuguese version Every day everybody receives many phishing attacks with malicious docs or PDFs. I decided to take a…

    8 条评论
  • PowerShell Introduction

    PowerShell Introduction

    I wrote this article to show a brief introduction about how to use PowerShell daily. Many professionals work…

    9 条评论
  • Carreira em Cybersecurity

    Carreira em Cybersecurity

    English Version Fala galera sempre escrevo artigos, compartilho posts de alguns sites que acompanho e acho relevante…

    10 条评论

社区洞察

其他会员也浏览了