Cyber Security

Written by:

Jason Fitch, MBA

what is cyber security?

What Is Cyber Security?

 

Cyber security is the practice of protecting systems, human resources, and physical assets from attacks. Attacks exploit vulnerabilities or weaknesses. Malicious code is then delivered to access, change, steal, ransom, or destroy sensitive information.

 

In some cases, the goal of a cyber attack is to disrupt or bring down a network and its business operations.

 

What Are The Types Of Cyber Security?

 

There are two types of cyber security:

 

  1. Offensive (Red Teaming)
  2. Defensive (Blue Teaming)

 

Red Teams are offensive in nature and specialize in attacking systems, networks, human resources, or physical assets with the goal of breaking through security defenses. Blue Teams play defense and maintain the internal network against all cyber attacks and threats.

 

Somewhere in the middle are Purple teams, which is not a separate team, although it can be. When red teams and blue teams come together to share knowledge from eachother’s discipline they enchance the security capabilities of an organization.

 

Advanced cyber security programs will perform simulated red team attacks against the blue team’s defenses in order to test the effectiveness of the network’s security.

 

The purpose of these simulations isn’t for the red team to breakthrough or for the blue team to detect an attack.  Instead, the goal is for both teams to share information on how to improve the overall security posture of the organization.

 

What Does Cyber Security Protect?

 

Cyber security professionals are responsible for defending against any number of attacks.

 

For example, there are teams responsible for protecting critical infrastructure like:

 

  • Hospitals
  • Traffic lights
  • Power grids.

 

Most businesses are familiar with network security which includes developing password policies, installing anti-virus software on computers and servers, implementing security awareness training, deploying next-generation firewalls, or monitoring internet access.

 

Other attacks target specific software applications. SQL, a coding language synonymous with databases, could be the target of an SQL injection attack.

 

Exploiting this vulnerability can result in the bad guys accessing and exfiltrating data from your network.

 

Internet of Things (IoT) devices, or anything that connects wireless to the internet, are also susceptible to a cyber attacks.

 

This includes appliances, sensors, televisions, wifi routers, and printers.

 

How Can I Protect Myself From Cyber Attacks?

 

Cyber attacks are constantly evolving requiring businesses to be proactive in deploying solutions.

 

To get started, organizations often develop cyber security policies.

 

Outside of standardizing practices, these policies provide a road map to employees of what to do and when to do it.

 

Learn More: How To Build A Cyber Security Program

 

Implementing security awareness training has also risen in popularity, as 98% of cyber attacks rely on social engineering as its entry point into an organization’s network.

 

The goal of this training is to inform and educate employees on how to identify common attacks used by threat actors.

 

The wide adoption of these programs owes its success to how effective the training is at mitigating internal risk.

 

Even with training mistakes still happen. In order to reduce this risk further, businesses often deploy email spam filters and anti-malware filters as the first line of defense against phishing attacks.

 

The idea is to catch malicious attachments and links to sites containing malicious code before they reach users.

 

Your systems and devices connected to a network are also at risk if software and patches are not kept up-to-date. Software developers frequently release updates to fix bugs or patch security vulnerabilities.

 

Vulnerability scans and vulnerability assessments are used to identify weaknesses within your system or network.

 

Reports are then drafted categorizing the vulnerabilities found along with an action plan for remediating threats.

 

Continue Reading: How To Prevent Cyber Attacks

 

Learn How To Secure Your Organization

 

No matter where your security maturity lies today, this expert written content will help you learn cyber security to build a more secure organization.

 

These resources are filled with expert interviews, how to guides written by security professionals with real world experience, practical and actionable tips that you can apply today, case studies, and so much more.

 

recent cyber security attacks - breach report

Recent Cyber Attacks & Data Breaches In 2021

As data breaches become more pervasive in our interconnected world so must our understanding of modern day cyber attacks.   In this video series, we sit down with cyber security experts and get their take on the most recent cyber attacks and breaches in 2021.   [contact-form-7 id="7208" title="Breach Report"]     Article Navigation   What Is The Breach Report? Breach Report #15: Saudi Aramco $50 Million Data...

Read More
Cyber security news, analysis, and updates

2021 Cyber Security News, Analysis, & Updates

In this video series, we review the latest cyber security news, industry analysis, and updates on recent cyber attacks that have happened so far this year.   https://www.youtube.com/playlist?list=PLXXRE-F0fw2XNfsBDFsdzAe4kggiUZtgl   Contents   Good Morning Infosec #4: Are Cyber Criminals Coming After Your Video Games? Good Morning Infosec #3: JBS, The World's Largest Beef Producer Pays $11 Million Ransom Good Morning Infosec #2: Is Your Employer Spying...

Read More
DNS amplification - cyber attacks

How To Prevent A Domain Name Server (DNS) Amplification attack

A domain name server amplification attack is a popular form of DDoS attack that attempts to flood a target system with DNS response traffic   You can prevent a DNS amplification attack by Implementing Source IP Verification on a network device, Disabling Recursion on Authoritative Name Servers, Limiting Recursion to Authorized Clients, and Implementing Response Rate Limiting (RRL) setting on DNS Server.     What...

Read More
SNY attack - cyber attack

How To Prevent A SYN Flood Attack

SYN floods are a form of DDoS attack that attempts to flood a system with requests in order to consume resources and ultimately disable it.   You can prevent SYN flood attacks by installing an IPS, configuring your firewall, installing up to date networking equipment, and installing commercial monitoring tools.     What Is A SYN Flood Attack?   For every client and server connection using the...

Read More
ping attack - cyber attack

How To Prevent A ICMP Flood Attack

Ping attacks are a form of DDoS attack that attempts to flood a system with requests in an attempt to disable it.   You can prevent ping attacks by configuring your firewall, adding filters to your router, looking at spoofed packets, monitoring traffic patterns, scanning your network.     What Are Ping Attacks?   A ping attack is an attack designed to overwhelm or flood a targeted...

Read More
buffer overflow - cyber attack

How To Prevent A Buffer Overflow Attack

A buffer overflow is one of the best known forms of software security vulnerability and is still a commonly used cyber attack.   You can prevent a buffer overflow attack by auditing code, providing training, using compiler tools, using safe functions, patching web and application servers, and scanning applications.     What Is A Buffer Overflow Attack?   In a buffer overflow attack, an application receives more...

Read More
Distributed Denial of Service (DDoS) - Cyber Attacks

How To Prevent A Distributed Denial Of Service (DDoS) Attack

Distributed denial of service attacks continues to increase in size, frequency, and duration.   According to a report from the Kaspersky Lab, DDoS attacks grew 80% in the first quarter of 2020 compared to the same quarter last year.   You can prevent a distributed denial of service attack by Developing a denial of service response plan, Securing your network infrastructure, Filtering routers at...

Read More
what is a security operations center - soc expert explains

What Is A Security Operations Center?

Cyber attacks are becoming ever more pervasive in our daily lives. As a result, businesses must shift their mindset to monitoring these threats in real-time.   That's where a Security Operations Center (SOC) comes into play.   In this article, I'll share my 10+ years of professional experience leading a SOC team. First, I'll discuss what a SOC is and the 3 main benefits...

Read More
hipaa risk assessment

How To Perform A Successful HIPAA Risk Assessment

Cyber security, specifically ransomware, continues to be a concern for healthcare professionals with 69% believing they are at risk for a data breach.   In fact, recent security trends, point to ransomware continuing to be the #1 threat facing healthcare providers in 2021. One step towards good cyber hygiene is by performing a HIPAA risk assessment.   In short, there are 5 main steps...

Read More
types of security controls

The 3 Types Of Security Controls (Expert Explains)

Security controls play a foundational role in shaping the actions cyber security professionals take to protect an organization.   There are three main types of IT security controls including technical, administrative, and physical. The primary goal for implementing a security control can be preventative, detective, corrective, compensatory, or act as a deterrent. Controls are also used to protect people as is the...

Read More
How to prevent cyber attacks 2020

How To Prevent The Top Cyber Attacks In 2022

Cyber attacks and threats are constantly evolving, with 350,000 new malware signatures detected every day.   While cyber attacks and threats are an ongoing fight, they can be prevented by being aware of the various types of protocols, exploits, tools, and resources used by malicious actors. In addition, knowing where and how to expect attacks ensure you're creating preventative measures to protect...

Read More
NIST 800-171 Incident Reporting Compliance Requirements

NIST 800-171 Incident Reporting Compliance Requirements

One thing is hard to argue in today’s complex cyber world:   Cyber incidents are part of doing business.   Chances are, your organization’s data will be—or already has been—breached.   With 92% of malware is delivered by email, it’s no surprise that cyber incidents that expose sensitive data are spreading like wildfire.   Most organizations focus on mitigation: you remove viruses, launch employee “don’t click” training programs,...

Read More
Data Loss Prevention Strategy

7 Data Loss Prevention Best Practices & Strategies

[vc_row][vc_column][vc_empty_space][vc_row_inner css=".vc_custom_1655296803437{background-color: #f9f9bb !important;border: 3px solid #e8d740 !important;border-radius: 3px !important;}"][vc_column_inner][vc_column_text css=".vc_custom_1655297046447{padding-top: 10px !important;padding-right: 10px !important;padding-bottom: 10px !important;padding-left: 10px !important;}"]Secure Your Organization's Data Check out these 9 data security strategies you need to be implementing in 2022 to protect what matters most to your organization.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space][vc_column_text]On average it takes organizations 191 days to identify data breaches.   If an organization lacks diligence in protecting the sensitive...

Read More
red team vs blue team in cyber security

Red Team VS Blue Team: What’s The Difference?

Red and blue teams are more than just Halo references and army techniques. In fact, these teams play an important role in defending against advanced cyber attacks that threaten business communications, sensitive client data, or trade secrets.   [embed]https://www.youtube.com/watch?v=jNY59pil8Tk[/embed]   Red teams are offensive security professionals who are experts in attacking systems and breaking into defenses. Blue teams are defensive security professionals responsible for...

Read More
cyber security trends in 2021 - PurpleSec

10 Cyber Security Trends You Can’t Ignore In 2021

In this article, we offer our perspective on the top 10 cyber security trends in 2021.   Our team of IT security experts have spent hundreds of hours researching and analyzing the emerging threat landscape in 2020 to bring forward these predictions.   The purpose is to explain how these threats impact businesses and individuals alike while delivering actionable steps you can take to...

Read More