You are on page 1of 3

Cybersecurity means protecting data, networks, programs and other

information from unauthorized or unattended access, destruction or


change. In today’s world, cybersecurity is very important because of
some security threats and cyber-attacks. For data protection, many
companies develop software. This software protects the data.
Cybersecurity is important because not only it helps to secure
information but also our system from virus attack. After the U.S.A.
and China, India has the highest number of internet users.

It can be further classified into 2 types. Cybercrime – against


individuals, corporates, etc.and Cyberwarfare – against a state.

Three Core Principles of Cybersecurity


Cybersecurity is not a simple thing. It is getting important with advanced technology
as it is important to save stored information in their systems. Three core principles of
cybersecurity are described as below:

Confidentiality

Integrity

Availability.

Risks
With the increase of the use of the Internet in life of people and increased concern of
hackers with great number of methods to hack, risks are getting increased for
security. There are some examples that show that system can be affected by cyber-
security incidents and have several threats for it. There can be many of the reasons
such as improper security control or there can be manmade errors of naturally
occurring disasters or it can because of some other reasons and these threats
include:

1. Daniel-of-services. Authorized functionality of the networks is protected and this risk


refers to attack this privacy and it can affect systems and applications by exhausting
resources. If a website of a government agency is shut down, there is an impact of
Daniel-of-services that was aimed to protect citizens to access information or for
accomplishment of transactions (Scully & Tim, 2011). It can have impact on financial
sector of a business and can impact critical services such as emergency medical system
and is having impact on communication.
2. Malware, worms and Trojan horses. With the increased number of instant messaging,
infected non-malicious websites and malicious websites, these threats spread and lead
to cause leakage of information. Most of the websites enormously download malware
that is affected to website and they are not having any kind of knowledge for it (Klonoff &
David, 2015). This is also called drive-by-download and sometimes websites require
other methods to download the chances of that increase of threats to spread legal and
sensitive information.
3. Botnets and zombies. It is referred to as robot networks in which aggregation of
compromised computers is connected with the central controller and these compromised
computers in this system are called zombies that can increase the threat level. With the
advancement in attack techniques, this will continuously increase threats for attack and
increase level of security issues (Solms & Niekerk, 2013). These computers can be
available to wide range of users and the people operating these computers with less
technical knowledge can get easily attacked by these services and their information can
be leaked. These technologies of attack are getting more advanced and it is getting more
difficult to detect these threats and hacking skills.
4. Fake security software warning. These are run by cyber-criminals as while
downloading any file or while using any software, an alert come for removing virus or
there is an alert to threat, these all are fake threats that are shown by criminals and they
show options to download certain files through which these viruses can be removed.
They show some applications to download that can protect their system from danger but
it is actually the real threat (Scully & Tim, 2011). Users do trust this kind of piece of
advice and they download the recommended file that leads to creating threats by stealing
the entire save data and sensitive information that can seriously harm the user and the
organization for which user is working. There can be opening of malicious websites while
following link on some websites that can bring breaching in their systems.

Because of an increased level of cyber-crime, it required to have cybersecurity so they can


get protection from harmful material. The technology is increasing and with advancement in
technology, ratio of people conducting cyber-crimes is also increasing with increase in key
techniques that are adopted by them to hack many of the systems and to get useful
information through it.

With the increased complexities and increased number of breaches in daily life and
increased technical life of individuals as well as organizations, it is getting important to know
the weaknesses of security system of an organization so security can be more restricted. All
of the cybersecurity risks associated with an organization must be identified clearly to
provide better protection to business and to increase performance of cybersecurity so an
organization can get protection from number of risks and future threats that can highly affect
productivity and image of an organization in the competitive market (Jaishankar &
Karuppannan, 2011).

General Computer usage – Best practices

a) Use account with limited privileges on systems and avoid accessing with administrator privileges
for day-to-day usage.
b) Keep Operating System, Application software and Anti-Virus software updated by applying the
latest service packs and patches.

c) Backup of important files at regular intervals.

d) Do not leave system unattended. Log out of or lock your computer when stepping away, even for
a moment

e) Supervise maintenance or rectification of faults in the system by service engineers.

f) Do not download unfamiliar software off the Internet.

g) Remove unnecessary programs or services from computer: Uninstall any software and services
you do not need

h) Restrict remote access. If file sharing is not required in your day-to-day work, disable file and print
sharing.

i) Treat sensitive data very carefully.

j) Remove data securely: Remove files or data you no longer need to prevent unauthorized access to
them. Merely deleting sensitive material is not sufficient, as it does not actually remove the data
from your system

k) If your networking devices are not using IPv6, disable IPv6 from computer.

l) Always maintain a redundant power supply

m) Use system’s screen locking functionality to protect against physical access, such as a screen
saver that won’t deactivate without a password, or just log out of everything so anyone that wants
access has to log in again.

n) The systems should be placed in a room which is dust free and has a good ventilation to avoid
overheating of CPU.

o) Do not plug the computer directly to the wall outlet as power surges may damage computer.
Instead use a genuine surge protector to plug a computer.

p) Don’t eat food or drink near the PC.

q) There should be no magnets near to your PC.

r) Scan all the files after you download whether from websites or links received from e-mails

You might also like