{"id":121658,"date":"2023-04-24T20:26:44","date_gmt":"2023-04-24T20:26:44","guid":{"rendered":"https:\/\/businessyield.com\/?p=121658"},"modified":"2023-05-02T09:56:42","modified_gmt":"2023-05-02T09:56:42","slug":"what-is-cyber-security","status":"publish","type":"post","link":"https:\/\/businessyield.com\/bs-business\/what-is-cyber-security\/","title":{"rendered":"WHAT IS CYBER SECURITY? Examples, Threat & Importance","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"

The cost of cyberattacks on a global scale is predicted to increase by 15% per year and surpass $10 trillion. Attacks by ransomware, which currently cost US firms $20 billion annually, are a significant component of this cost. In the US, a data breach typically costs $3.8 million. Public companies lose, on average, 8% of their stock value following a successful breach, which is another worrying fact. We\u2019ll discuss what a cyber security threat is, why it\u2019s important in engineering, and some examples in this post.<\/p>

What is Cyber Security<\/strong>?<\/span><\/h2>

The term \u201ccyber security\u201d covers all facets of safeguarding a company\u2019s assets, personnel, and operations from online dangers. A variety of cyber security solutions are needed to reduce business cyber risk as cyberattacks become more frequent and sophisticated and corporate networks become more complicated.<\/p>

The Different Types of CyberSecurity<\/strong><\/span><\/h2>

The field of cyber security is broad and includes several academic fields. Its seven main pillars are as follows:<\/p>

#1. Network Security<\/strong><\/span><\/h3>

The majority of attacks take place across networks, and network security solutions are made to spot and stop these attacks. These solutions incorporate data and access controls, including Next-Generation Firewall (NGFW) application restrictions, Network Access Control (NAC), Data Loss Prevention (DLP), Identity Access Management (IAM), and NAC (Identity Access Management), to enact safe online use regulations.<\/p>

#2. Cloud Security<\/strong><\/span><\/h3>

Securing the cloud becomes a top priority as businesses utilize cloud computing more and more. An organization\u2019s whole cloud deployment (applications, data, infrastructure, etc.) can be protected from attack with the help of cyber security solutions, controls, policies, and services.<\/p>

#3. Endpoint Security<\/strong><\/span><\/h3>

The zero-trust security concept advises enclosing data wherever it may be in micro-segments. Using endpoint security with a mobile workforce is one method to achieve that. Employing advanced threat prevention techniques like anti-phishing and anti-ransomware, as well as technologies that offer forensics like endpoint detection and response (EDR) solutions, businesses may secure end-user devices like desktops and laptops.<\/p>

#4. Mobile Security<\/strong><\/span><\/h3>

Mobile devices, such as tablets and smartphones, are frequently disregarded but have access to corporate data, putting firms at risk from phishing, malicious software, zero-day vulnerabilities, and IM (Instant Messaging) assaults. These attacks are stopped by mobile security, which also protects operating systems and devices from rooting and jailbreaking.<\/p>

#5. IoT Security<\/strong><\/span><\/h3>

Although deploying Internet of Things (IoT) devices undoubtedly increases productivity, it also exposes businesses to new online threats. Threat actors look for weak devices that are unintentionally connected to the Internet in order to utilize them for illicit purposes like gaining access to corporate networks or joining another bot in a large bot network.<\/p>

#6. Application Security<\/strong><\/span><\/h3>

Like anything else that is directly connected to the Internet, web apps are a target for threat actors. Since 2007, OWASP has kept track of the top 10 risks to serious online application security issues such as cross-site scripting, injection, and weak authentication, to mention a few.<\/p>

#7. Zero Trust<\/strong><\/span><\/h3>

The traditional security paradigm focuses on the perimeter, creating fortified walls around a company\u2019s most important assets. This strategy has a number of drawbacks, including the possibility of insider threats and the quick demise of the network perimeter.<\/p>

Cyber Security Examples<\/strong><\/span><\/h2>

Here are a few current examples of cyber security that affected the entire world.<\/p>

#1. Kaseya Ransomware Attack<\/strong><\/span><\/h3>

A supply chain attack against the US-based remote management software vendor Kaseya was made public on July 2, 2021. The business disclosed that ransomware could be installed on consumer computers by attackers using its VSA solution.<\/p>

#2. SolarWinds Supply Chain Attack<\/strong><\/span><\/h3>

This enormous, extremely creative supply chain attack was discovered in December 2020 and was given the name SolarWinds in honor of its Austin-based victim, an IT management company. It was carried out by APT 29, a gang that regularly commits cybercrime and is linked to the Russian government.<\/p>

#3. DDoS attack on Amazon<\/strong><\/span><\/h3>

Amazon Web Services (AWS) was the victim of a significant distributed denial of service (DDoS) assault in February 2020. A 2.3 Tbps (terabits per second) DDoS assault that had a request rate per second (rps) of 694,201 and a packet forwarding rate of 293.1 Mpps was experienced by the company and mitigated. It\u2019s regarded as one of the biggest DDoS attacks ever.<\/p>

#4. Microsoft Exchange Remote Code Execution Attack<\/strong><\/span><\/h3>

A significant cyberattack against Microsoft Exchange, a well-known enterprise email server, was launched in March 2021. It made use of four different zero-day flaws found in Microsoft Exchange servers.<\/p>

#5. Twitter Celebrities Attack<\/strong><\/span><\/h3>

Three attackers broke into Twitter in July 2020 and took control of well-known Twitter accounts. They carried out social engineering attacks\u2014later recognized by Twitter as vishing (phone phishing)\u2014to acquire employee credentials and gain access to the company\u2019s internal management systems.<\/p>

What is Cyber Security Threat<\/strong><\/span><\/h2>

Cybersecurity threats are actions taken by people with malicious intent in order to steal data, harm computing systems, or disrupt them. We go into more detail about each of these categories below. Common categories of cyber threats include malware, social engineering, man-in-the-middle (MitM) attacks, denial of service (DoS), and injection attacks.<\/p>

Cyber threats can come from a wide range of sources, including adversarial nation-states and terrorist organizations, lone hackers, and legitimate users like employees or contractors who use their privileges for bad purposes.<\/p>

Common Sources of Cyber Security Threat<\/strong><\/span><\/h2>

Here are a few typical sources of cyber security threat to businesses:<\/p>