GoldenGolden
Cybersecurity

Cybersecurity

Cybersecurity is the protection of software, hardware, and data from digital attacks for the purpose of accessing, changing, destroying, interrupting, or extorting assets and information.

Overview

Cybersecurity, also known as computer security and information technology security, protects internet-connected systems from malicious cyber-attacks and focuses on protecting hardware, software, and data systems from unauthorized manipulation, control, and theft.

There are many cybersecurity approaches for protecting digital assets, including application security, information security, network security, operational security, disaster recovery, business continuity planning, and end-user education.

Data security

Data security is the term used to describe digital data protection, such as information stored in databases, from destructive outside forces, unwanted actions from hackers or cyberattacks, and accidental errors introduced by unauthorized users. Data security is a high-level term used to describe various sub-services, including data privacy, synthetic data, data encryption including cryptography and homomorphic encryption, and data integrity.

Synthetic data

According to McGraw-Hill, synthetic data is "any production data applicable to a given situation that is not obtained by direct measurement." Craig S. Mullins describes production data as "information that is persistently stored and used by professionals to conduct business processes."

Data encryption

Data encryption is a security method used to encode information that users can only access or decrypt with the correct encryption key. Encrypted data is sometimes referred to as ciphertext and will appear scrambled or unreadable to individuals without the proper access information. Two types of data encryption are homomorphic encryption, which allows an individual to perform calculations on encrypted data without decrypting it first, and cryptography, which requires a user to have a key to view the information.

Data integrity

Data integrity is defined as the overall accuracy, completeness, and consistency of data. Additionally, data integrity references regulatory compliance and data safety; one example is GDRP compliance and security. The integrity of data is maintained by processes and standards that are implemented in the design phases. Sub-sectors of data security include adversarial machine learning and artificial intelligence (AI) safety.

Adversarial machine learning

Adversarial machine learning is a machine learning technique that attempts to fool or trick models through deceptive input to cause a malfunction in the machine learning model. This is done to fix breaks in code and better protect machine learning models from providing inaccurate data with vulnerabilities that can compromise the entirety of data sets.

AI safety

AI safety is an important developing technology as the development of deepfakes grows more prominent. Deepfakes are a synthetic AI form where users take on the identity of other people. Synthetic media generation of photorealistic avatars and actors causes concern for identity theft and biometric data collection, resulting in companies developing software to detect deepfakes proactively.

Network security

Network security is a set of rules and configurations developed and designed to protect the confidentiality, integrity, and accessibility of computer networks. Network security softwares work to prevent and monitor access, misuse, and modification of computer networks or other network-accessible devices or resources.

Application security

Application security is the process of finding, fixing, and enhancing the protection and securities involving applications. App security is typically implemented in the development stages, but oftentimes includes various tools and methods to help protect apps after they are deployed for use. Application security has become more necessary over the years as hackers have turned attention to applications over traditional websites and emails. Automated methods for assessing the effectiveness of application security have been developed including static program analysis and dynamic program analysis.

Static program analysis

Static program analysis is used in application security to ensure a product is protected before it is deployed. Static analysis takes place in a non-runtime environment and is also referred to as static application security testing (SAST). SAST is the method of looking at an application and testing its securities from the inside out. The test is performed without the deployment of the application and instead focuses on the source code, byte code, or application binaries for signs of vulnerability regarding security. Once the SAST is complete, data and control paths are modeled for security weakness analysis of the internal structure and security of the application, not the overall functionality.

Dynamic program analysis

Dynamic analysis, also known as dynamic application security testing (DAST) is a testing method that looks at the application from the outside, while the program or application is operating. DAST programs test the integrity of the application through manipulations to find vulnerabilities. The dynamic test simulates an outside attack against an application and analyzes the application's reactions to determine the level of vulnerability, if a vulnerability exists.

Endpoint security

Endpoint security is the process of securing endpoints or entry points on end-user devices such as laptops, desktops, and mobile devices from malicious attacks. Endpoint security systems and software protect the endpoints on the network or in the cloud from cybersecurity threats. Endpoint security has evolved from the well-known anti-virus software programs into software that can defend endpoints from sophisticated malware. Endpoint security is the combination of various software including antivirus, identity and access management, mobile device management, authentication, fraud detection, identity theft, email security, and anti-phishing.

Timeline

People

Name
Role
LinkedIn

Further reading

Title
Author
Link
Type
Date

Documentaries, videos and podcasts

Title
Date
Link

The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac

September 7, 2018

Companies

Company
CEO
Location
Products/Services

News

Title
Author
Date
Publisher
Description
May 8, 2021
Moneycontrol
Colonial has engaged a third-party cybersecurity firm to launch an investigation and contacted law enforcement and other federal agencies, it said.
May 9, 2021
mint
The shutdown has raised fears of a price spike at the gas pumps ahead of peak demand summer driving season if it persists
Global Center for Cybersecurity
May 6, 2021
www.prnewswire.com:443
/PRNewswire/ -- On the heels of a historic global pandemic that has resulted in an increase in cybercrime and revealed deep inequities in talent within the...
Aditya Saroha
May 6, 2021
The Hindu
Passwords with a user's name or their pet's name can make it easy for cyber criminals to hack as a lot of personal data is available online.
Michael Cogley and Reuters
April 30, 2021
Business Insider
The British cybersecurity firm was valued at $2.37 billion during its IPO on the London Stock Exchage on Friday.
PlainID
April 22, 2021
www.prnewswire.com:443
/PRNewswire/ -- PlainID, the Authorization Company, today announced that Gal Helemski, Co-founder and Chief Innovation and Product Officer, has been named a...
Michael Cogley
April 12, 2021
Business Insider
Darktrace will give the London Stock Exchange another chance to prove itself as a hospitable home for tech startups.
Anina Ot
April 9, 2021
www.cloudsavvyit.com
With more companies managing their assets digitally, file integrity monitoring became an essential part of ensuring the safety and security of files, as well as, the company's overall cybersecurity.
Andrii Degeler
April 6, 2021
Tech.eu
The European startup ecosystem has been showing great growth numbers over the past year, which was well documented by ourselves and other organisations that keep track of the numbers. In the first quarter of this year, however, we also noticed a significant number of startups entering the unicorn territory -- a metric that may be showing [...]
Ryan Wright
April 1, 2021
Harvard Business Review
Three ways to maintain cybersecurity without jeopardizing employee trust.
Eric Knorr
March 8, 2021
CSO Online
The challenges are greater than ever. But security pros have learned a lot - and with luck, the right strategic defenses can help even the highest-value targets withstand severe attacks.
24By7Security, Inc.
March 4, 2021
www.prnewswire.com:443
/PRNewswire/ -- 24By7Security announced today that Network Products Guide, industry's leading technology research and advisory guide, has named the CMMC...
Dan Goodin
February 24, 2021
Ars Technica
Ukraine says Russia also backed massive DDoS attack using never-before-seen methods.
Aaron Holmes
February 5, 2021
Business Insider
Cybersecurity teams are hiring more analysts tasked with rooting out insider threats as the pandemic increases the risk of data breaches and leaks.
Brand Post
February 2, 2021
CIO
As attacks increase while budgets shrink, it makes sense to call in expert assistance.
Women in CyberSecurity (WiCyS)
January 28, 2021
www.prnewswire.com:443
/PRNewswire/ -- From speakers to student research posters, Women in CyberSecurity (WiCyS) is calling for participation in its conference Sept. 8-10, 2021,...
Reuters
January 23, 2021
The Hindu
Cybersecurity was demoted as a policy field under the Trump administration.
Hikvision Digital Technology
January 19, 2021
www.prnewswire.com:443
/PRNewswire/ -- In spite of a highly unusual 2020, the security industry's constant transformation has not stopped. Several significant shifts in the use of...
Sonam Sheth
December 19, 2020
Business Insider
"This could just be the tip of the iceberg," said a former NSA analyst. "No one had a solution to preventing an attack like this and here we are."
SHOW MORE

References

Page 1 of 2
Golden logo
Text is available under the Creative Commons Attribution-ShareAlike 4.0; additional terms apply. By using this site, you agree to our Terms & Conditions.