It is the protection of computer, networks from hack or protection of their software and hardware from any type of damage.
This is also termed as “Cybersecurity” or “Computer Security” or Information Technology Security.
This branch has gained so much popularity and still becoming more important due to the increase in digital technology such as
✓ Computer Systems
✓ Wireless Network.
and one more important factor that is an increase in smart devices that is smartphones and other stuff.
This is the most important and challenging factor in today’s technology. and the world can’t escape from this.
Well, let’s describe it more precisely.
Attacks, Security breaches and its impact
Nothing is 100 % perfect in this universe, the same situation is with this. There is some weakness in their construction, implementation and control system. These weaknesses are termed as “Vulnerability”.
There is a term exploitable vulnerability means at least one attack for which security breakdown exists.
To secure a system or network it is important to understand the attacks that can be used against vulnerability. There is a list of some threats :
* Direct access Attacks
If a user gains physical access to a computer, then they can copy data from the system. Even they may break security by installing software worms, keyloggers or by modifying the operating system.
This is the secret method of passing an authentication or security system.
Backdoor can be very hard to detect if you don’t have advance knowledge of operating systems.
* Denial-of-service attack
This is an attempt to access users details such as username, password and card details
by deceiving users.
* Social engineering
This is the process of gaining information or data from the user or anyone.
Some types of spoofing :
- Biometric spoofing
- Email address spoofing
- MAC spoofing
- IP address spoofing
* Privilege escalation
This is a negative modification of data or some changes in the same data.
Let’s discuss some of their impacts:
It is very hard to estimate the cost of an incident because there is no data available or that is not made public by organizations.
But one thing is very clear that security breaches have caused very serious economical and financial damage.
This is the reason why organizations are investigating in cybersecurity.
Systems at Risk
Increase in the computer system and dependency of various sectors on this has increased systems at risk. Some of these services are:
- Financial systems
- Large Industries
- Consumer devices
- Medical system
- Utilities and industrial equipment
- Energy services
Some notable list of data breaches
- Robert Morris and the first computer worm
This incident takes place on 2nd November 1988.
- Rome Laboratory (1994)
- TJX customer credit card details (2007)
- Stuxnet attack (2010)
- Global surveillance disclosures (2013)
- Target and Home Depot breach (2013)
- Office of Personnel Management data breach (April 2015)
- Ashley Madison breach ( June 2015)
- Comelec breach ( March 2016)
- Yahoo (September 2016)
There are some ways to prevent or minimize
threat, vulnerability and attack.
- Secure by design
- Security measures
- Vulnerability management
- Hardware protection mechanisms
- Security architecture
- Secure coding
- Digital hygiene
- Response to breaches
- End-user security training
- access control lists
- Secure operating systems
Cybersecurity or information technology security Jobs and salary
The increasing popularity of this field has also increased career opportunities for students or professionals. Some of its job titles are below :
- Security analyst
average salary ($88,043 per year).
- Security architect
average salary ($123,448 per year ).
- Security engineer ($108,151 per year)
- Security administrator ($81,346 per year)
- Chief Information Security Officer (CISO) ($105,000 per year)
- Chief Security Officer (CSO) ($131,314 per year)
- Security Consultant ($79,725 per year)…etc
Some free course program is also available in some countries for students.