What Is Cyber Security?

what is cyber security?Cyber security is the practice of protecting systems, human resources, and physical assets from attacks. Attacks exploit common vulnerabilities or weaknesses. Malicious code is then delivered to access, change, steal, ransom, or destroy sensitive information. In some cases, the goal of a cyber attack is to disrupt or bring down a network and its business operations.

 

What Are The Types Of Cyber Security?

 

There are two types of cyber security:

 

  1. Offensive (Red Teaming)
  2. Defensive (Blue Teaming)

 

Red Teams are offensive in nature and specialize in attacking systems, networks, human resources, or physical assets with the goal of breaking through security defenses. Blue Teams play defense and maintain the internal network against all cyber attacks and threats.

 

Advanced cyber security programs will perform simulated red team attacks against the blue team’s defenses in order to test the effectiveness of the network’s security. The purpose of these simulations isn’t for the red team to breakthrough or for the blue team to detect an attack.  Instead, the goal is for both teams to share information on how to improve the overall security posture of the organization.

 

What Does Cyber Security Protect?

 

Cyber security professionals are responsible for defending against any number of attacks. For example, there are teams responsible for protecting critical infrastructure including hospitals, traffic lights, or power grids.

 

Most businesses are familiar with network security which includes developing password policies, installing anti-virus software on computers and servers, implementing security awareness training, deploying next-generation firewalls, or monitoring internet access.

 

Other attacks target specific software applications. SQL, a coding language synonymous with databases, could be the target of an SQL injection attack. Exploiting this vulnerability can result in the bad guys accessing and exfiltrating data from your network.

 

Internet of Things (IoT) devices, or anything that connects wireless to the internet, are also susceptible to a cyber attacks. This includes appliances, sensors, televisions, wifi routers, and printers.

 

How Can I Protect Myself From Cyber Attacks?

 

Cyber attacks are constantly evolving requiring businesses to be proactive in deploying solutions. To get started, organizations often develop cyber security policies. Outside of standardizing practices, these policies provide a road map to employees of what to do and when to do it.

 

Implementing security awareness training has also risen in popularity, as 98% of cyber attacks rely on social engineering as its entry point into an organization’s network. The goal of this training is to inform and educate employees on how to identify common attacks used by threat actors. The wide adoption of these programs owes its success to how effective the training is at mitigating internal risk.

 

Even with training mistakes still happen. In order to reduce this risk further, businesses often deploy email spam filters and anti-malware filters as the first line of defense against phishing attacks. The idea is to catch malicious attachments and links to sites containing malicious code before they reach users.

 

Your systems and devices connected to a netowrk are also at risk if software and patches are not kept up-to-date. Software developers frequently release updates to fix bugs or patch security vulnerabilities. Vulnerability scans and assessments are used to identify weaknesses within your system or network. Reports are then drafted categorizing the vulnerabilities found along with an action plan for remediating threats.

 

Related Resources

 

In this section, you will discover all things related to cyber security including what it is, why it’s important, and how businesses can protect themselves. From tips to hows, you will find it here!

 

Privilege Escalation Attacks

Privilege Escalation Attacks: Everything You Need To Know

Privilege escalation attacks exploit weaknesses and vulnerabilities with the goal of elevating access to a network, applications, and mission-critical systems. There are two types of privilege escalation attacks including vertical and horizontal. Vertical attacks are when an attacker gains access to an account with the intent to perform actions as that user. Horizontal attacks gain access to account(s) with limited...

Read More
Cyber Security Healthcare Statistics

19 Cyber Security Healthcare Statistics You Need To Know

Recent statistics showing trends in cyber security threats to the healthcare industry are a cause for concern.  Because healthcare facilities are critical, they are increasingly becoming the target of cyber attacks.   In this article, I’d like to take a closer look at these statistics, and what they actually mean for anyone responsible for ensuring the integrity and confidentiality of healthcare facilities....

Read More
red team vs blue team in cyber security

What Is A Red Team VS A Blue Team In Cyber Security?

Red and blue teams are more than just Halo references and army techniques. In fact, these teams play an important role in defending against cyber attacks that threaten business communications, sensitive client data, or trade secrets.   Red teams are offensive security professionals who are experts in attacking systems and breaking into defenses. Blue teams are defensive security professionals responsible for maintaining...

Read More
How To Protect Your Business From Most Cyber Attacks

5 Ways To Protect Your Business From Most Cyber Attacks

It's no secret that businesses are lucrative targets for would-be assailants. Most businesses, especially enterprise corporations, store valuable data and trade secrets that attackers want to use as leverage against the company or to sell it on the market.   Unfortunately, small and mid-sized businesses make for perfect targets because they often view cyber security as expensive, an afterthought, or not worth...

Read More