Te presentamos nuestras
categorías

What is cybersecurity?

Cybersecurity entails protecting various systems and data from malicious attacks. This field encompasses defending computers, servers, mobile devices, and networks, as well as the security of electronic information and information technology.

The main areas of cybersecurity include:

  1. Network security: Focuses on protecting computer networks against intrusions and malware, both targeted and opportunistic.
  2. Application security: Ensures that software and devices are free from threats, starting from the design stage through to implementation.
  3. Information security: Preserves the integrity and privacy of data, both in storage and transmission.
  4. Operational security: Involves processes and decisions to manage and protect data resources, including user permissions and data storage and sharing procedures.
  5. Disaster recovery and business continuity: Defines how an organization responds to cybersecurity incidents or events that disrupt its operations, including recovery policies and plans to continue operating without certain resources.
  6. End-user training: Addresses the human factor in cybersecurity, teaching users to adopt secure practices, such as avoiding opening suspicious attachments or connecting unidentified USB drives.

Cybersecurity is essential for protecting infrastructure and data in an increasingly digitized world.

The spread of cyber threats

The expansion of cyber threats continues at an accelerated pace, with a steady increase in the number of data breaches every year. According to a report by RiskBased Security, during the first nine months of 2019, a staggering 7.9 billion records were exposed due to data breaches, more than double the number in the same period of 2018, representing a 112% increase.

The sectors most affected by these breaches were healthcare services, retailers, and public entities, with malicious actors primarily responsible for these incidents. Although some sectors, such as healthcare and finance, are more attractive targets due to the sensitivity of the data they handle, all businesses that use networks are at risk of experiencing attacks to steal data, conduct corporate espionage, or affect their customers.

With the continuation of this trend, a significant increase in global spending on cybersecurity solutions is expected. Gartner forecasts that by 2023, spending will reach $188.3 billion and surpass $260 billion by 2026. In response to these growing threats, governments worldwide have issued guidelines to help organizations implement effective cybersecurity practices.

For example, in the United States, the National Institute of Standards and Technology (NIST) has developed a cybersecurity framework that includes recommendations such as continuous and real-time monitoring of electronic resources to counter the proliferation of malicious code and facilitate early detection.

The importance of system monitoring is also highlighted in the “Ten Steps to Cybersecurity” provided by the UK Government’s National Cyber Security Centre. In Australia, the Australian Cyber Security Centre (ACSC) regularly publishes guidance on how organizations can combat the latest cyber threats.

Types of cyber threats

The threats faced by cybersecurity can be grouped into three main categories:

  • Cybercrime: This category encompasses individuals or groups who carry out attacks with the aim of obtaining financial gains or causing disruptions to systems. Cybercrime can manifest in various forms, such as stealing personal or financial data, online fraud, data hijacking (ransomware), and other technology-related criminal activities.
  • Cyberattacks with political motivations: These attacks are aimed at gathering information for political purposes. Perpetrators can be individuals, groups, or even state actors seeking to obtain confidential information or influence public opinion through data and system manipulation.
  • Cyberterrorism: In this case, the objectives of the attacks are to weaken electronic systems to cause panic, fear, or even physical harm. Unlike other types of cyberattacks, cyberterrorism primarily aims to impact society and may involve actions such as sabotaging critical infrastructures, spreading disinformation, or disrupting public services.

These threats represent significant challenges for cybersecurity in today’s world, requiring constant vigilance and preventive measures at both individual and organizational levels, as well as governmental levels.

How do malicious actors gain control of computer systems? Here are some of the common methods used to threaten cybersecurity:

Malware:

The term “malware” refers to malicious software, one of the most prevalent cyber threats today. This type of software is created by cybercriminals or hackers with the purpose of disrupting or damaging legitimate users’ computer systems. Typically, malware spreads through unsolicited emails with attachments or downloads that appear legitimate. Cybercriminals use malware to obtain financial gains or carry out cyberattacks with political motivations.

There are various types of malware, including:

  • Viruses: Programs capable of self-replicating that insert themselves into clean files and spread throughout the computer system, infecting other files with malicious code.
  • Trojans: Malware that disguises itself as legitimate software. Cybercriminals trick users into downloading trojans onto their computers, where they can cause damage or collect data.
  • Spyware: Programs that secretly record a user’s activities, allowing cybercriminals to use that information. For example, spyware can capture credit card details.
  • Ransomware: Malware that blocks a user’s files and data, threatening to delete them unless a ransom is paid.
  • Adware: Advertising software that can be used to distribute malware.
  • Botnets: Networks of infected computers with malware that cybercriminals use to carry out online activities without the user’s consent.

SQL injection:

SQL injection is a cyberattack used to gain control of and steal data from a database. Cybercriminals exploit vulnerabilities present in data-driven applications to insert malicious code into compromised SQL statements. This provides them with access to confidential information hosted in the database.

Phishing:

Phishing is a technique used by cybercriminals to deceive their victims by sending emails that appear to come from legitimate companies, requesting confidential information. These attacks typically aim to persuade people to disclose their financial data, such as credit card numbers, and other personal information.

Man-in-the-middle Attack:

A man-in-the-middle attack is a form of cyber threat in which a cybercriminal interferes in the communication between two parties to intercept and, in some cases, alter the transmitted data. For example, in an unsecured Wi-Fi network, an attacker could intercept the information sent between the victim’s device and the network, allowing them to steal or manipulate the data without the involved parties realizing.

Denial of Service (DoS) Attack:

A denial of service attack is perpetrated by cybercriminals with the aim of preventing a computer system from handling legitimate requests by deliberately overloading networks and servers with malicious traffic. This type of attack results in the incapacitation of the affected system, preventing an organization from carrying out vital functions effectively.

Recent Cyber Threats:

Cyber threats constantly evolve, and it is crucial to stay abreast of the latest trends to adequately protect oneself. Below are some of the recent threats reported by the governments of the United States, Australia, and the United Kingdom:

1. Malware Dridex:

In December 2019, the United States Department of Justice indicted the leader of a group of cybercriminals for their involvement in a global attack with the Dridex malware. This malicious campaign affected individuals, governments, infrastructures, and businesses worldwide.

Dridex is a financial trojan that spreads through phishing emails or existing malware. Capable of stealing passwords, banking, and personal data, it has caused massive financial losses totaling hundreds of millions of dollars.

In response to Dridex attacks, the United Kingdom’s National Cyber Security Centre advises ensuring that devices are updated, antivirus software is enabled, and file backups are performed.

2. Romance Scams:

In February 2020, the FBI warned US citizens about the increase in online scams through dating sites, chat rooms, and applications. Cybercriminals take advantage of those seeking romantic relationships to deceive them and obtain personal information.

According to the FBI, these scams affected 114 victims in New Mexico during 2019, with financial losses totaling $1,600,000.

3. Emotet Malware:

In late 2019, the Australian Cyber Security Centre issued a warning about the global spread of Emotet malware.

Emotet is a sophisticated trojan that can steal data and distribute other types of malware. Exploiting weak passwords, it underscores the importance of using strong passwords to protect against cyber threats.

End User Protection:

End user protection, or endpoint security, is a critical aspect of cybersecurity, as it is often the individual (the end user) who inadvertently allows malware or other cyber threats into their device, whether desktop, laptop, or mobile.

So, how do cybersecurity measures protect end users and their systems? Firstly, cybersecurity relies on cryptographic protocols to encrypt emails, files, and other sensitive data. Not only does it protect information in transit, but it also provides defenses against loss or theft.

Additionally, end user security software scans computers for malicious code, isolates it, and removes it from the device. It can even detect and remove malicious code hidden in the master boot record (MBR) and is designed to encrypt or erase data from the hard drive.

Electronic security protocols also focus on real-time malware detection. Many employ heuristic and behavioral analysis to monitor program behavior and code, defending against viruses or trojans that can change with each execution (polymorphic and metamorphic malware). Some security programs even confine suspicious programs to a separate virtual environment from the user’s network to analyze their behavior and improve the detection of new infections.

Security programs continue to evolve with new defenses, while cybersecurity professionals identify and combat new threats. To make the most of end user security software, employees must learn to use it properly, ensuring it is kept running and regularly updated to protect users against the latest cyber threats.

Cybersecurity Tips: Protection against Cyberattacks

  1. Update software and operating system: Keep your software and operating system up to date to take advantage of the latest security patches and updates.
  2. Use antivirus software: Install and use reliable antivirus software, such as Kaspersky Total Security, to detect and remove threats. Make sure to keep it updated for the best possible protection.
  3. Create strong passwords: Use strong and unique passwords that are difficult to guess. Avoid using obvious personal information and consider using password managers to securely manage your credentials.
  4. Do not open attachments from unknown senders: Avoid opening email attachments from unknown senders, as they may contain malware or phishing attempts.
  5. Do not click on links from unknown senders: Avoid clicking on links in emails or websites from unknown senders, as they may lead to malicious or phishing pages designed to steal personal information.
  6. Avoid unsecured Wi-Fi networks: Avoid connecting to unsecured Wi-Fi networks in public places, as they may leave your device vulnerable to man-in-the-middle attacks and other cyber threats. Instead, use a secure VPN connection or mobile hotspot when possible.

ÚLTIMAS NOTICIAS

Descubre las certificaciones que tenemos para usted

ayudamos a alcanzar su nivel óptimo gracias a nuestras certificaciones que permiten a los profesionales
impulsar su carrera y realizar sus ambiciones de vida.

¿DESEA MÁS INFORMACIÓN?

en_USEnglish

Do you want to log out?

Verification

   This course is NOT 12478 verified


   Issued by


This user is NOT verified


   VERIFIED