Eagle-Eyed Protection for Your Cyberspace

Sayumi De Alwis
Bug Zero
Published in
6 min readJan 15, 2023

--

What is Cybersecurity?

The application of technology, procedures, and controls to defend against cyberattacks by nefarious actors such as hackers, spammers, and cybercriminals on systems, networks, programs, devices, and data is referred to as “cyber security.” This has become a catch-all term for the process of preventing any type of cybercrime, from identity theft to the deployment of international digital weapons, and safeguarding against the unauthorized use of technology, networks, and systems.

image reference — https://www.hcamag.com/us/specialization/hr-technology/the-most-dangerous-cyber-security-mistakes/229498

Key concepts of cybersecurity

Cybersecurity is a fairly wide concept that can have a diverse range of meanings that revolve around the digital realm. The “CIA Triad” is a set of three main ideas that describe the notion of cyber security.

The terms confidentiality, integrity, and availability make up the acronym known as the CIA Triad.

Types of cyber threats

1.) Malware attack

One of the most typical kinds of cyberattacks is malware. Malicious software viruses such as worms, spyware, ransomware, adware, and Trojans are referred to as “malware.”

The Trojan appears to be trustworthy software. Spyware is software that secretly takes all of your private information, whereas ransomware shuts down access to the network’s essential parts. Adware is software that shows banner ads and other commercial information on a user’s screen.

2.) Phishing attack

Phishing is a sort of social engineering attack in which the attacker pretends to be a reliable source and sends the victim fake emails.

Unaware of this, the victim opens the email and either opens the attachment or clicks on the malicious link. Attackers are able to access private data and login passwords this way. A phishing attack also allows for the installation of malicious software.

image reference — https://www.enisa.europa.eu/news/enisa-news/enisa-threat-landscape-2020

Cybersecurity types

a.) Network security

Network security is essential for safeguarding client data and information, maintaining the security of shared data, guaranteeing reliable network performance, and defending against online attacks. An effective network security solution lowers overhead costs and protects businesses from significant losses caused by a data breach.

Types of network security protections are:

· Firewall: Network traffic is managed by firewalls using pre-established security rules. Firewalls are an essential component of daily computing since they block malicious traffic.

· Network segmentation: Network segmentation is an idea that has been around for a while. The separation of an organization’s internal network from the rest of the Internet is the most basic type of network segmentation.

· Access control: Access control establishes who, what, and how to access network applications and systems, preventing unauthorized access and maybe even threats.

· Remote Access VPN: When working from a distance or while traveling, give users safe, seamless access to company networks and resources. Through multi-factor authentication, endpoint system compliance scanning, and encryption of all transferred data, the privacy and integrity of sensitive information are guaranteed.

b.) Cloud security

A group of rules, controls, procedures, and technologies come together to form cloud security, often referred to as cloud computing security, in order to safeguard the infrastructure, data, and systems that are hosted in the cloud.

These are listed in order of service type:

· Software-as-a-service (SaaS) — Customers are responsible for securing their data and user access.

· Platform-as-a-service (PaaS) — Customers are responsible for securing their data, user access, and applications.

· Infrastructure-as-a-service (IaaS) — Customers are responsible for securing their data, user access, applications, operating systems, and virtual network traffic.

c.) IoT security

IoT security can be considered a cybersecurity strategy and defense system that secures against the possibility of cyberattacks that explicitly target physically linked IoT devices. Without strong security, any connected IoT device, such as Wi-Fi-enabled automobiles, networked security cameras, and smart refrigerators, is vulnerable to hacking and control, allowing hackers to eventually gain access, steal user data, and bring down networks.

Types of attacks that IoT devices are most prone to:

1. Firmware vulnerability exploits:

The majority of Internet of Things firmware does not have as many security safeguards as the sophisticated operating systems that operate on PCs. And frequently, there are known vulnerabilities in this firmware that, in some situations, cannot be fixed.

2. Credential based attacks:

The default administrator username and password are provided with a lot of IoT devices. These usernames and passwords are frequently not secure — for example, using the word “password” as the password — and what’s worse, sometimes all IoT devices of a particular model use the same login information. These credentials may not always be reset.

d.) Application security

In order to defend against dangers like illegal access and alteration, application security is the process of creating, integrating, and testing security measures within applications.

Types of application security:

· Authentication: Software developers include procedures in an application to guarantee that only users with appropriate access may access it. This may be done by making the user provide a username and password in order to access a program. Multiple forms of authentication are necessary for multi-factor authentication.

· Authorization: After a user has been authenticated, the user may be authorized to access and use the application. Authentication must happen before authorization so that the application matches only validated user credentials to the authorized user list.

· Encryption: Other security measures can prevent sensitive information from being seen or even utilized by a cybercriminal once a user has been verified and is using the program.

· Logging: If there is a security breach in an application, logging can help identify who got access to the data and how.

How to prevent cyberattacks

1. Use strong alphanumeric passwords that are difficult to crack, and change your passwords frequently. Avoid using too difficult passwords that you could forget. Never use the same password more than once.

2. Regularly update your operating system and programs. Utilize reputable and legal antivirus software.

3. Never open emails from senders you don’t know.

4. Use a firewall and other network security tools such as intrusion prevention systems, access control, application security, etc.

5. Authenticate via two-factor or multiple-factor methods. Users must submit two distinct authentication factors in order to utilize two-factor authentication to confirm their identity. Multi-factor authentication is what we call the process of requesting more than two extra authentication factors in addition to your login and password.

6. Secure your Wi-Fi networks and avoid using public Wi-Fi without using a VPN.

image reference — https://www.privacyend.com/protect-your-business-from-cyber-attacks/

Conclusion

One of the most important facets of the rapidly expanding digital world is cyber security. Therefore, it is vital to be knowledgeable about cyberattacks and network security due to the increase in cybercrimes and to impart that knowledge to others because cyber-attacks are hard to refute.

References

https://www.cloudflare.com/learning/security/glossary/iot-security/

Bug Zero is a bug bounty, crowdsourcing platform for security testing. The platform is the intermediatory entity that enables client organizations to publish their service endpoints so that bug hunters (security researchers / ethical hackers) registered in the platform can start testing the endpoints without any upfront charge. Bug hunters can start testing as soon as a client organization publishes a new program. Bug Zero also offers private bug bounty programs for organizations with high-security requirements.

https://bugzero.io/signup

Bug Zero is available for both hackers and organizations.

For organizations and hackers, register with Bug Zero for free, and let’s make cyberspace safe.

--

--