11/14/2021 0 Comments Cyber Security Risk ManagementCybersecurity, cyber security hygiene, or information security is the protection of networks and computer systems from intentional harm, data loss or damage of their hardware, applications, or personal electronic data, and from the intentional or unintentional disruption or misuse of their services. This can include hacking into a network to delete information, malicious attacks on computers that connect to a network, and other threats. It also includes preventing or destroying malicious attacks on a network by changing or making it difficult for an attacker to use the targeted application. In order to protect computer systems from cyber attacks and defend against them in the future, one has to be skilled in many areas. Although it can be learned and taught in many schools, most people go through years of experience in defending network from hackers before they attempt to learn or carry out cyber security themselves. Even though that may be okay with some, who wants to spend years training others to do what they already do? There are many ways to prevent and defend against cyber attacks, and one of the more robust cyber security measures is firewalls. The purpose of firewalls is to deny an attacker access to a system. An example of a firewall is a packet filter or network protector. Firewalls can block an attacker before he even gets to the system. Some can do it once, but that is not always practical because an attacker might continue to find ways around or evade the filters. Linked here are more details about cyber security. Apart from that, there are also several programs and utilities that can be used to protect against cyber threats. One such utility is Trend Micro's Personal Security Solution (PSS). The PSS detects and blocks cyber threats before they could even harm your computer, by running a background check on newly installed USB drives and other ports. With a background check, it can protect you from fake emails purporting to be from your bank or other institutions when in fact these messages are phishing scams. Of course, you can also do something to prevent any attacks from occurring. That's another form of cyber security risk management. A proactive approach to cyber security risk management involves both prevention and blocking. Preventive measures include creating a strong password for your accounts, making sure your email software has security protection, setting up firewalls on your networks, and making sure your systems are updated regularly. As for blocking, you can do it manually, by changing your internet settings, removing ports and plug-ins from websites, and so on. You can block an attackers by IP address, by using port scanners to determine which files have been infected, and so on. Awareness training can help too. It is very easy for a person to get careless about their security measures and to accidentally or intentionally weaken them. A good example of this is when people go to the computer for work and use the same password for different accounts, and then use the same information for online accounts. Having awareness training about data breaches could help people avoid doing these kinds of things. This post: https://en.wikipedia.org/wiki/Cyberattack elaborates more on the topic, so you may need to check it out.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |