Cyber Security

Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cyber security.

Network outages, data compromised by hackers, computer viruses and other incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation.

It is important because governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.

During a Senate hearing in March 2013, the nation’s top intelligence officials warned that cyber attacks and digital spying are the top threat to national security, eclipsing terrorism.

10 Cyber Security Trends 2016

  1. DevSecOps
  2. Wearable Tech Risks
  3. Social Engineering
  4. Threat Intelligence Budgeting
  5. Open Source Vulnerability
  6. Ransomeware
  7. Data Integrity
  8. Geopolitical Security
  9. Cloud Malware
  10. Internet of Things

Cyber Criminal

A cybercriminal is an individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.

Cybercriminals use computers in three broad ways:

  • Select computer as their target: These criminals attack other people’s computers to perform malicious activities, such as spreading viruses, data theft, identity theft, etc.
  • Uses computer as their weapon: They use the computer to carry out “conventional crime”, such as spam, fraud, illegal gambling, etc.
  • Uses computer as their accessory: They use the computer to save stolen or illegal data.

 

-Geraldine Kaye Medrocillo

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s