SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Cybersecurity
Introduction
The informatic security is known too as cybersecurity, is an area that is focused to
the protection of the computational infrastructure and everything related with.
The cybersecurity refers about the practice of defend the computers, servers, mobile
devices, electronic systems, networks and any malware. The government of the
United States of America invest 13,000 millions of dollars per year in cybersecurity
but the cyberattacks are in a constantly evolution. The National Institute of Standars
and Technology recommends the continuous monitoring and in real time of all the
electronic resources.
Every time that you hear cybersecurity people though that is something that has
relation with hackers and yes but is not only that, is not only about attack the servers
or computers of a company, is about recognize, react and erase every kind of threat
faster as possible for avoid any kind of damage that the attacker could do and to
identify any kind of vulnerability that could be used by the attackers to get into the
system and do whatever they want. In the next part we will describe the types of
threats that you have to monitoring continuously:
• Intern threat: This is probably one of the dangerous threats in this matter
because this involves many people like the workers that knows about how the
environment works, how the network works, the location of the information
and every data that is of the interest of the attackers.
• Extern threat: Are the threats that are out of the network, the attackers that
doesn’t know the necessary information about the place that wants to attack
they need to do many steps to enter to the network that they want.
• Threats by effect: Could be stole of information, destruction of the
information, block the correct functioning of the system, identity supplantation,
etc.
• Threats by the way they use: In this part we talk about the way that the
attacker uses for enter into the system, etc.
This is a little view about how many ways an attacker could do for penetrate into the
place they want enter.
In the future people though that with evolution of the technology that is growing with
a very fast steps, the new trend of the cybercriminals will change into the
manipulation of the certificates that has the digital information.
Now a days we have the problem that now the attackers are professional and are
available to manipulate the information of the digital data.
We can talk about the internet of things and with the mirai network, the mirai network
is a network that has the purpose of infect routers, cameras and many other objects
that are connected to the internet of things and make that objects like zombies for
an DDoS attack for the place that you want to attack, this is a very recently new way
for attack using the new technology that is the internet of things.
For give protection to the system even if it’s the router for your personal internet you
need to protect that not only on the hardware, in the software you need to implement
many techniques of cryptology, cryptography and cryptoscience. This techniques of
protection needs to be implemented in all the parts that circulates information that
needs to be protected and not only on the more vulnerable parts.
Other way of protection is to use passwords that cant be deduced by the personal
data that you have and that need to be changed and if you use digital certifications
you could be more secure with your personal things.
In a resume way we can divide the fact about why the cybersecurity exist and are
the next main 3 points:
• Cybercrime: Includes individual people or groups of people that lead attacks
to different systems to get financial earnings, it could for enterprises or even
to a normal user, it depends about what the attackers wants to get or how
much.
• Cyberwar: Involves the recompilation of information about politic motivations
more commonly, another example could be the hypothetic manipulation of the
elections in United States with Donald Trump winning as president, but that
involves another kind of themes that this essay essay is not about.
• Cyberterrorism: The main purpose of this is to compromise the electronic
systems and cause panic and fear.
The more common way of how the attackers can control the computers or
networks includes informatic virus, worms, spyware and trojan virus. In continue
we are gonna explain about some of the virus that we mentioned before:
• Virus and worms: This kind of malware can autoreplicate themselves and
to damage systems and data.
• Spyware and trojans: This virus are used for the recompilation of data and
records, for enter in contact with this kind of malware the common user
only needs to open, for example, a mail or when a user downloads a
program that looks legitimate but in fact, that program have a malware.
There are many other kind of threats out there, in the network, if you download a
program, you can be infected with the insertion of a USB, etc. There are many ways
of how you can be infected with a virus but it depends of you to take the necessary
precautions to be secure, even with a simple password that has no relation with you,
with this simple precaution for begin you have more probabilities to be more secure
in the informatic media.
Conclusions
In conclusion there are many ways about how the cybersecurity works, and every
simple user that doesn’t know about cybersecurity is available to do his part by doing
a good password that has no relation with the personal data or his life so for the
attackers will be hard to decipher the information they need for enter to the place
they want, in a world that is everyday more connected and closer with the computers
we need to have a kind of culture of security, even with the more basic part like how
to make better passwords, how to navigate more secure in the network and all this
kind of stuffs, because people doesn’t steal only in person, sometimes they hide
themselves with a computer in front of them.
Bibliography
• https://latam.kaspersky.com/resource-center/definitions/what-is-
cyber-security
• https://es.wikipedia.org/wiki/Seguridad_inform%C3%A1tica
• https://www.obs-edu.com/int/blog-investigacion/sistemas/que-es-
ciberseguridad-y-de-que-fases-consta

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Cyer security
Cyer securityCyer security
Cyer securitywindows21
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 

Was ist angesagt? (20)

Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Cyer security
Cyer securityCyer security
Cyer security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Ähnlich wie Cybersecurity

CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxtanyamudgal4
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 

Ähnlich wie Cybersecurity (20)

THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
CYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptxCYBER SECURITY ppt.pptx
CYBER SECURITY ppt.pptx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Brooks18
Brooks18Brooks18
Brooks18
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 

Kürzlich hochgeladen

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 

Kürzlich hochgeladen (20)

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 

Cybersecurity

  • 1. Cybersecurity Introduction The informatic security is known too as cybersecurity, is an area that is focused to the protection of the computational infrastructure and everything related with. The cybersecurity refers about the practice of defend the computers, servers, mobile devices, electronic systems, networks and any malware. The government of the United States of America invest 13,000 millions of dollars per year in cybersecurity but the cyberattacks are in a constantly evolution. The National Institute of Standars and Technology recommends the continuous monitoring and in real time of all the electronic resources. Every time that you hear cybersecurity people though that is something that has relation with hackers and yes but is not only that, is not only about attack the servers or computers of a company, is about recognize, react and erase every kind of threat faster as possible for avoid any kind of damage that the attacker could do and to identify any kind of vulnerability that could be used by the attackers to get into the system and do whatever they want. In the next part we will describe the types of threats that you have to monitoring continuously: • Intern threat: This is probably one of the dangerous threats in this matter because this involves many people like the workers that knows about how the environment works, how the network works, the location of the information and every data that is of the interest of the attackers.
  • 2. • Extern threat: Are the threats that are out of the network, the attackers that doesn’t know the necessary information about the place that wants to attack they need to do many steps to enter to the network that they want. • Threats by effect: Could be stole of information, destruction of the information, block the correct functioning of the system, identity supplantation, etc. • Threats by the way they use: In this part we talk about the way that the attacker uses for enter into the system, etc. This is a little view about how many ways an attacker could do for penetrate into the place they want enter. In the future people though that with evolution of the technology that is growing with a very fast steps, the new trend of the cybercriminals will change into the manipulation of the certificates that has the digital information. Now a days we have the problem that now the attackers are professional and are available to manipulate the information of the digital data. We can talk about the internet of things and with the mirai network, the mirai network is a network that has the purpose of infect routers, cameras and many other objects that are connected to the internet of things and make that objects like zombies for an DDoS attack for the place that you want to attack, this is a very recently new way for attack using the new technology that is the internet of things. For give protection to the system even if it’s the router for your personal internet you need to protect that not only on the hardware, in the software you need to implement many techniques of cryptology, cryptography and cryptoscience. This techniques of protection needs to be implemented in all the parts that circulates information that needs to be protected and not only on the more vulnerable parts.
  • 3. Other way of protection is to use passwords that cant be deduced by the personal data that you have and that need to be changed and if you use digital certifications you could be more secure with your personal things. In a resume way we can divide the fact about why the cybersecurity exist and are the next main 3 points: • Cybercrime: Includes individual people or groups of people that lead attacks to different systems to get financial earnings, it could for enterprises or even to a normal user, it depends about what the attackers wants to get or how much. • Cyberwar: Involves the recompilation of information about politic motivations more commonly, another example could be the hypothetic manipulation of the elections in United States with Donald Trump winning as president, but that involves another kind of themes that this essay essay is not about. • Cyberterrorism: The main purpose of this is to compromise the electronic systems and cause panic and fear. The more common way of how the attackers can control the computers or networks includes informatic virus, worms, spyware and trojan virus. In continue we are gonna explain about some of the virus that we mentioned before: • Virus and worms: This kind of malware can autoreplicate themselves and to damage systems and data. • Spyware and trojans: This virus are used for the recompilation of data and records, for enter in contact with this kind of malware the common user only needs to open, for example, a mail or when a user downloads a program that looks legitimate but in fact, that program have a malware.
  • 4. There are many other kind of threats out there, in the network, if you download a program, you can be infected with the insertion of a USB, etc. There are many ways of how you can be infected with a virus but it depends of you to take the necessary precautions to be secure, even with a simple password that has no relation with you, with this simple precaution for begin you have more probabilities to be more secure in the informatic media. Conclusions In conclusion there are many ways about how the cybersecurity works, and every simple user that doesn’t know about cybersecurity is available to do his part by doing a good password that has no relation with the personal data or his life so for the attackers will be hard to decipher the information they need for enter to the place they want, in a world that is everyday more connected and closer with the computers we need to have a kind of culture of security, even with the more basic part like how to make better passwords, how to navigate more secure in the network and all this kind of stuffs, because people doesn’t steal only in person, sometimes they hide themselves with a computer in front of them. Bibliography • https://latam.kaspersky.com/resource-center/definitions/what-is- cyber-security • https://es.wikipedia.org/wiki/Seguridad_inform%C3%A1tica • https://www.obs-edu.com/int/blog-investigacion/sistemas/que-es- ciberseguridad-y-de-que-fases-consta