GoldenGolden
Advanced Search
Cybersecurity

Cybersecurity

Cybersecurity is the protection of software, hardware, and data from digital attacks for the purpose of accessing, changing, destroying, interrupting, or extorting assets and information.

Overview

Cybersecurity, also known as computer security and information technology security, protects internet-connected systems from malicious cyber-attacks and focuses on protecting hardware, software, and data systems from unauthorized manipulation, control, and theft.

There are many cybersecurity approaches for protecting digital assets, including application security, information security, network security, operational security, disaster recovery, business continuity planning, and end-user education.

Data security

Data security is the term used to describe digital data protection, such as information stored in databases, from destructive outside forces, unwanted actions from hackers or cyberattacks, and accidental errors introduced by unauthorized users. Data security is a high-level term used to describe various sub-services, including data privacy, synthetic data, data encryption including cryptography and homomorphic encryption, and data integrity.

Synthetic data

According to McGraw-Hill, synthetic data is "any production data applicable to a given situation that is not obtained by direct measurement." Craig S. Mullins describes production data as "information that is persistently stored and used by professionals to conduct business processes."

Data encryption

Data encryption is a security method used to encode information that users can only access or decrypt with the correct encryption key. Encrypted data is sometimes referred to as ciphertext and will appear scrambled or unreadable to individuals without the proper access information. Two types of data encryption are homomorphic encryption, which allows an individual to perform calculations on encrypted data without decrypting it first, and cryptography, which requires a user to have a key to view the information.

Data integrity

Data integrity is defined as the overall accuracy, completeness, and consistency of data. Additionally, data integrity references regulatory compliance and data safety; one example is GDRP compliance and security. The integrity of data is maintained by processes and standards that are implemented in the design phases. Sub-sectors of data security include adversarial machine learning and artificial intelligence (AI) safety.

Adversarial machine learning

Adversarial machine learning is a machine learning technique that attempts to fool or trick models through deceptive input to cause a malfunction in the machine learning model. This is done to fix breaks in code and better protect machine learning models from providing inaccurate data with vulnerabilities that can compromise the entirety of data sets.

AI safety

AI safety is an important developing technology as the development of deepfakes grows more prominent. Deepfakes are a synthetic AI form where users take on the identity of other people. Synthetic media generation of photorealistic avatars and actors causes concern for identity theft and biometric data collection, resulting in companies developing software to detect deepfakes proactively.

Network security

Network security is a set of rules and configurations developed and designed to protect the confidentiality, integrity, and accessibility of computer networks. Network security softwares work to prevent and monitor access, misuse, and modification of computer networks or other network-accessible devices or resources.

Application security

Application security is the process of finding, fixing, and enhancing the protection and securities involving applications. App security is typically implemented in the development stages, but oftentimes includes various tools and methods to help protect apps after they are deployed for use. Application security has become more necessary over the years as hackers have turned attention to applications over traditional websites and emails. Automated methods for assessing the effectiveness of application security have been developed including static program analysis and dynamic program analysis.

Static program analysis

Static program analysis is used in application security to ensure a product is protected before it is deployed. Static analysis takes place in a non-runtime environment and is also referred to as static application security testing (SAST). SAST is the method of looking at an application and testing its securities from the inside out. The test is performed without the deployment of the application and instead focuses on the source code, byte code, or application binaries for signs of vulnerability regarding security. Once the SAST is complete, data and control paths are modeled for security weakness analysis of the internal structure and security of the application, not the overall functionality.

Dynamic program analysis

Dynamic analysis, also known as dynamic application security testing (DAST) is a testing method that looks at the application from the outside, while the program or application is operating. DAST programs test the integrity of the application through manipulations to find vulnerabilities. The dynamic test simulates an outside attack against an application and analyzes the application's reactions to determine the level of vulnerability, if a vulnerability exists.

Endpoint security

Endpoint security is the process of securing endpoints or entry points on end-user devices such as laptops, desktops, and mobile devices from malicious attacks. Endpoint security systems and software protect the endpoints on the network or in the cloud from cybersecurity threats. Endpoint security has evolved from the well-known anti-virus software programs into software that can defend endpoints from sophisticated malware. Endpoint security is the combination of various software including antivirus, identity and access management, mobile device management, authentication, fraud detection, identity theft, email security, and anti-phishing.

Timeline

People

Name
Role
LinkedIn

Further reading

Title
Author
Link
Type
Date

Documentaries, videos and podcasts

Title
Date
Link

The Five Laws of Cybersecurity | Nick Espinosa | TEDxFondduLac

September 7, 2018

Companies

Company
CEO
Location
Products/Services

News

Title
Author
Date
Publisher
Description
August 13, 2021
Harvard Business Review
class="mbm">Sponsor content from Siemens Energy.
July 29, 2021
WebWire
, , , , • The transaction, which includes 100% of the share capital of Cancom UK&I, was completed for €398 million at a multiple of 13.5x EV/ OIBDA (based on 2021E)., , , , , , , , , , • With 600 employees, Cancom UK&I provides professional and managed services in advanced IT, cyber security and multi-cloud solutions., , , , , , , , , , • This acquisition reinforces Telefónica Tech's growth story and its positioning in one of the Group's four key markets, the UK., , , , , , Telefónica Tech has agreed with Canco...
MIT Technology Review Insights
July 12, 2021
MIT Technology Review
The enterprise attack surface is broad--sensors, devices, and cloud services connected to facilities and real estate. That leaves companies vulnerable, but AI can help.
Latham & Watkins
June 17, 2021
www.prnewswire.com:443
/PRNewswire/ -- Latham & Watkins LLP1 is pleased to announce that Antony ("Tony") Kim has joined the firm's Washington, D.C. office as a partner in the...
Emeritus
June 11, 2021
www.prnewswire.com:443
/PRNewswire/ -- With ransomware, malware, phishing and other cyber-attacks threatening the security of companies, government entities, and organizations across...
UMBC Training Centers and Virtanza Career Pathways
June 7, 2021
www.prnewswire.com:443
/PRNewswire/ -- In an ongoing effort to further develop Technology Career Pathways for students and help the region's employers fill the surging technical...
Credence Security
June 2, 2021
www.prnewswire.com:443
/PRNewswire/ -- The demand for leading cybersecurity and digital forensics solutions are higher than ever. For over two decades, Credence Security, a PAN-EMEA...
Andy Greenberg
May 31, 2021
Wired
From NotPetya to SolarWinds, it's a problem that's not going away any time soon.
Shelby Brown
May 31, 2021
CNET
Mastering cybersecurity can unlock new career opportunities. Here's how to get started.
May 8, 2021
Moneycontrol
Colonial has engaged a third-party cybersecurity firm to launch an investigation and contacted law enforcement and other federal agencies, it said.
May 9, 2021
mint
The shutdown has raised fears of a price spike at the gas pumps ahead of peak demand summer driving season if it persists
Global Center for Cybersecurity
May 6, 2021
www.prnewswire.com:443
/PRNewswire/ -- On the heels of a historic global pandemic that has resulted in an increase in cybercrime and revealed deep inequities in talent within the...
Aditya Saroha
May 6, 2021
The Hindu
Passwords with a user's name or their pet's name can make it easy for cyber criminals to hack as a lot of personal data is available online.
Michael Cogley and Reuters
April 30, 2021
Business Insider
The British cybersecurity firm was valued at $2.37 billion during its IPO on the London Stock Exchage on Friday.
PlainID
April 22, 2021
www.prnewswire.com:443
/PRNewswire/ -- PlainID, the Authorization Company, today announced that Gal Helemski, Co-founder and Chief Innovation and Product Officer, has been named a...
Michael Cogley
April 12, 2021
Business Insider
Darktrace will give the London Stock Exchange another chance to prove itself as a hospitable home for tech startups.
Anina Ot
April 9, 2021
www.cloudsavvyit.com
With more companies managing their assets digitally, file integrity monitoring became an essential part of ensuring the safety and security of files, as well as, the company's overall cybersecurity.
Andrii Degeler
April 6, 2021
Tech.eu
The European startup ecosystem has been showing great growth numbers over the past year, which was well documented by ourselves and other organisations that keep track of the numbers. In the first quarter of this year, however, we also noticed a significant number of startups entering the unicorn territory -- a metric that may be showing [...]
Ryan Wright
April 1, 2021
Harvard Business Review
Three ways to maintain cybersecurity without jeopardizing employee trust.
SHOW MORE

References

Page 1 of 2
Golden logo
Text is available under the Creative Commons Attribution-ShareAlike 4.0; additional terms apply. By using this site, you agree to our Terms & Conditions.