×

Message

PLG_KUNENADISCUSS_DEPENDENCY_FAIL

001. WELCOME TO THE WORLD OF CYBER SECURITY OPS

 

And here we are, dealing with one of the hottest topics in the IT industry. Two days or a full week can never go by before we hear a security incident happening somewhere on our planet. Threat actors’ motive being anything from notoriety, to financial gain. Today it is not only the job of network and cyber security engineers to keep us safe but each and every one of us has a role to play.

 

Due to the importance of cyber security in our world today, we are going to focus and dive in into different technologies and ways in which network engineers and cyber security specialists can employ to keep and have a safe working environment for all users.

 

So what is cyber security?  Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.

 

 

 

 

Cyber security includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection. Also, due to malpractice by operators, whether intentional, accidental, IT security is susceptible to being tricked into deviating from secure procedures through various methods.

 

The field is of growing importance due to the increasing reliance on computer systems and the Internet, wireless networks such as Bluetooth and Wi-Fi, the growth of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things.

 

One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against. Such an approach is insufficient in the current environment.

 

To deal with the current environment, advisory organizations are promoting a more proactive and adaptive approach. The National Institute of Standards and Technology (NIST), for example, recently issued updated guidelines in its risk assessment framework that recommended a shift toward continuous monitoring and real-time assessments.

 

According to Forbes, the global cybersecurity market reached $75 billion for 2015 and is expected to hit $170 billion in 2020.

 

 

THE END.

 

Go to top