ANDREW ISAACS NAMED BRIDGETOWER CAPITAL PRESIDENT

We are pleased to announce that Andrew Isaacs has joined BridgeTower as its new President. In addition to overall operational responsibilities, Andrew will lead the firm’s investment banking, capital…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




What is Cyber Security to you?

Submission by @The-Mitigator (Telegram & Discord)

Security will forever remain a phenomenon of an incredibly complex nature. The convergence of variables will always, in any case, ensure that unsolved problems remain. Therefore, it is also true that security is as much perception, as it is reality. That is to say, security in itself, which appears to be convoluted and complex, may act as a deterrent itself. Scaring people away from trespassing on your property just because it is seemingly too difficult is just as effective as having an actual impenetrable lock.

The invention and innovation of an array of communications technologies (such as radio, telephones, television, computers and finally, the internet) has had a massive impact on the day-to-day movements of mankind. Even to such an extent that any person lacking access to such devices are marginalized. Not only in their process of development, but also as their fulfillment as a human being.

Today, we can instantly connect with nearly anyone else on the globe. Almost everyone carries around in their pockets or purses a device that infinitely dwarfs the library of Alexandria. This little miracle of science has changed the frames of reference for legal and social coexistence. With it comes a whole new threat and challenge.

These threats arise from the new tests and challenges that represent the ethics and morality of society. This new digital, interconnected world brings with it a new battle of good and evil. Even to such an extent that it has been necessary to coin the term “hacker”. The term is a reference to cyber criminals who steal, destroy, filter or alter platforms or information of others. They bring threats with them that could affect any member of society; both individually and collectively. Some are even so capable that they are able to affect a national security system.

Attacks directed at organizations to try and steal or filter information present perhaps, in economic terms, the most dangerous threat of all. As they are addressed to servers, they focus on commonly used filters or databases containing large amounts of valuable information. Selling the private data of people can be profitable. Hacking into any financial system can prove even more profitable.

One of the most often overlooked flaws, however, is the aspect of Human Interaction.

Humans are among the highest ranking vulnerabilities especially those that do not have a background in technology, and lack any fundamental understanding of security. The greatest threat is taking anything for granted. Anyone can operate a cell phone, and nearly everyone has one, yet people don’t pay any attention to its security despite the plethora of sensitive data they carry around on it. Virus scanners are considered a drain on resources, and will shorten their battery life. As such, it is easily discarded, even if it’s pre-installed in the first place. This leaves data such as private conversations, saved passwords and contacts vulnerable.

This is the greatest vulnerability. People bring their mobile devices into work, day in and day out. They connect to the WiFi, gain access to the company’s intranet, and at the end of the day they return home and use their own, less secure connection. This opens companies up against possible malicious applications or backdoors, installed through this less secure home network.

Privately, we carry our phones with us and use them throughout the day. We connect to WiFi hotspots in public restaurants and other locales, which makes our devices much more susceptible to malicious actors.

ODIN intends to combat this fatal flaw in cyber security not just through education, but also by providing secure applications.

These vulnerabilities do not simply end at us taking our mobile devices and connections for granted. The Internet of Things is growing, and they make our lives much easier. They also make our lives much more dangerous.

Every day we are upgrading our homes. We want the newest technologies there are available. They give us bragging rights, and a whole new level of comfort. No longer do we need to stand up to turn down the thermometer. In fact, even that has already been one-upped: If you are at work and about to head home during the winter, you can now heat up your home simply through your phone, just before you leave. Now you won’t enter a cold home with 40 minutes of discomfort. Instead, your home has a nice ambient temperature the moment you set foot in the door.

It is these devices that are, once again, a massive security risk. Nobody bothers to check and see if the firewall is activated on their thermostat. How do you even run a malware check on a thermostat?

To counter these new dangers, a new branch has come to life. Cyber Security is the discipline that focuses on the safety and security of users and corporations that are connected online. It is where the standards, procedures, methods and techniques aimed at providing safe and reliable conditions for data are developed. This consists of ensuring the resources of an information system in an organization are used as intended. That access to the information it contains, as well as modifying this, is only available to those that are accredited and authorized to do so.

There are three principles of Cyber Security, which must be met by any computer system:

Confidentiality:

This aspect refers to the privacy of information elements stored and processed in a computer system. Based on this principle, computer security tools must protect the system from invasions and access by unauthorized people or programs. This principle is particularly important in distributed systems; that is, those in which users, computers and data reside in different locations, but are physically and logically interconnected.

Integrity:

The aspect of integrity refers to the validity and consistency of stored information elements and processing in a computer system. Based on this principle, computer security tools should ensure that the update processes are well synchronized and do not duplicate, ensuring all elements of the system are properly able to handle the same data. This principle is important in decentralized systems, that is, those in which different users, computers and processes share the same information.

Availability:

The principle of availability refers to the continuity of access to the informational elements stored and processed in a computer system. Based on this principle, computer security tools should reinforce the permanence of the computer system, in conditions of adequate activity for users to access data with the frequency and dedication they require. This principle is important in computer systems whose commitment to the user is to provide permanent service.

By following these three principles the risk of attack is minimized. It becomes harder for attackers to penetrate network and infrastructure equipment.

Add a comment

Related posts:

Mother Care

Hello Mothers and Pregnants, I just finished listening of book “Empowering the child” and i want to tell you, this book is something especiall, there is written everything and explained in details…

HAMPIR TELAT

Seseorang mengetuk-ketuk dasrboard mobil dengan tidak tenang, ia melakukan itu karena sudah menjadi kebiasaan saat dirinya sedang dilanda kegelisahan. Yap, kebiasaan seorang Vanilla Kai sedari kecil…