Cyber Security
Cyber Security
Cyber Security
BSCOE 4-1
Cybersecurity
• Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks. It's also known as information technology
security or electronic information security. The term applies in a
variety of contexts, from business to mobile computing, and can be
divided into a few common categories.
• Cybersecurity is the protection of internet-connected systems such
as hardware, software and data from cyber threats. The practice is
used by individuals and enterprises to protect against unauthorized
access to data centers and other computerized systems.
Trends in Cybersecurity Events
and Protection Techniques
1. Remote working cybersecurity risks
• Since the pandemic, working from home has become much more
widespread worldwide. Even once the pandemic fades, many
predict that remote working will remain prevalent across multiple
sectors. While working from home is convenient and has many
benefits, it also exposes both individuals and businesses to a range
of cybersecurity risks. That’s why it is essential to give serious
consideration to home cybersecurity. By following best practices,
you can mitigate most cybersecurity work from home threats quite
easily.
How to stay safe when working from home
• 1. Use antivirus and internet security software at home
• 2. Keep family members away from work devices
• 3. Invest in a sliding webcam cover
• 4. Use a VPN
• 5. Use a centralized storage solution
• 6. Secure your home Wi-Fi
• 7. Beware of Zoom and video conferencing
• 8. Make sure your passwords are strong and secure
• 9. Protect your online banking
• 10. Be wary of email scams and your email security
2. The Internet of Things (IoT) evolving
• The expanding Internet of Things (IoT) creates more opportunities
for cybercrime. The Internet of Things refers to physical devices
other than computers, phones, and servers, which connect to the
internet and share data. Examples of IoT devices include wearable
fitness trackers, smart refrigerators, smartwatches, and voice
assistants like Amazon Echo and Google Home. It is estimated that
by 2026, there will be 64 billion IoT
devices installed around the world. The trend towards remote
working is helping to drive this increase.
How to protect IoT systems and devices
• 1. Introduce IoT security during the design phase
• 2. PKI and digital certificates
• 3. Network security
• 4. API security
3. The Rise of Ransomware
• Ransomware isn’t a new threat – it’s been around for about two
decades – but it is a growing one. It’s estimated that there are now
over 120 separate families of ransomware, and hackers have
become very adept at hiding malicious code. Ransomware is a
relatively easy way for hackers to gain financial rewards, which is
partly behind its rise.
Protection against ransomware – how to
prevent an infection
• 1. Never click on unsafe links
• 2. Avoid disclosing personal information
• 3. Do not open suspicious email attachments
• 4. Never use unknown USB sticks
• 5. Keep your programs and operating system up to date
• 6. Use only known download sources
• 7. Use VPN services on public Wi-Fi networks
4. Increase in cloud services and cloud security threats
• The sheer volume of cyber security threats is too much for humans
to handle alone. As a result, organizations are increasingly turning
to AI and machine learning to hone their security infrastructure.
Privacy Considerations for AI
• Data accuracy
• Data protection
• Data control
7. Multi-factor authentication improving
https://online.champlain.edu/blog/top-cybersecurity-skills-in-high-demand
https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
https://www.techtarget.com/searchsecurity/definition/cybersecurity
https://www.kaspersky.com/resource-center/preemptive-safety/cyber-security-trends?fbclid=IwAR1ZTb5nexYKL-
GRAdUJ6N6ni5Alj-HVbdX-2-4k0PLDnSOViS_bq8OaTxY
https://www.kaspersky.com/resource-center/threats/remote-working-how-to-stay-safe
https://www.techtarget.com/iotagenda/definition/IoT-security-Internet-of-Things-security
https://www.kaspersky.com/resource-center/threats/how-to-prevent-ransomware
https://www.getkisi.com/blog/7-tips-prevent-cloud-security-threats
https://www.avast.com/c-social-engineering
https://www.boozallen.com/s/solution/four-ways-to-preserve-privacy-in-ai.html
https://www.prescientsolutions.com/blog/how-to-enhance-your-security-through-multi-factor-authentication/
https://digitalskills.cpace.csulb.edu/cybersecurity/how-to-secure-mobile-phone/