Cyber Security for 2020

Cyber Security protect from theft, corruption or natural disaster while allowing the information and property remain accessible. It helps to understand the cyber security strategy, cyber ecosystem and science of cyber security. Cyber security deals with securing the future- “Securing for tomorrow’s world”.
Securing for tomorrow’s world

Cyber Security Today

To the world of computer technology, government, police and intelligence units, Cyber crime is emerging as serious threat. Cyber Security techniques developed to safeguard information systems stored on computers. Potential threats which is include the destruction of Computer Software and Computer Hardware and the loss, modification, theft, unauthorized use, observation or disclosure of computer data. Cyber security restricted to describing the criminal activity in which the computer or network is a part of crime as fraud, black mail and theft.

Cyber Security protect from theft, corruption or natural disaster while allowing the information and property remain accessible. It helps to understand the cyber security strategy, cyber ecosystem and science of cyber security. Cyber security deals with securing the future- “Securing for tomorrow’s world”.

Many Companies spend million of their dollars on firewalls and secure access devices and it’s money wasted because none of these measures address the weakest link in the security chain.

5 Stages of Business Cyber Security

  1. Identity   
  • Am: Asset management
  • BE: Business environment
  • GV: Governance
  • RA: Risk Assessment
  • RM: Risk Management strategy

2. Project

  • AC: Access Control
  • AT: Awareness Training
  • DS: Data Security
  • IP: Information Protection process and procedures

3. Detect

  • AE: Anomalies and events
  • CM: Security Continuous Monitoring
  • DP: Detection Processes

4. Respond

  • RP: Response Planning
  • CO: Communications
  • AN: Analysis
  • MI: Mitigation
  • IM: Improvements

5. Recover

  • RP: Recovery Planning
  • IM: Improvements
  • CO: Communications

Cyber security Process

  • Assess = Analyze Assets and Controls
  • Evaluate = Understand GDPR Maturity Based on Current Program
  • Build = Develop Road map to Fill the Gaps
  • Execute = Take Action with Strategic GOPR Readiness Road map

This process repeat again and again.

Process for Secure from Cyber Security

  • Awareness = A lot of hacks happen because staff is not aware of the risks. Encourage SMEs to educate more in terms of cyber security.
  • Strong Passwords = With strong password it is one step closer to being secured from breaches or hacks.
  • Updates = Updating is one crucial part of being safe, for example a lot of websites get hacked through plugins that are out of date and vulnerable.
  • Backups = Having duplicate copies of your information saved in a remote location keeps it safe in case anything goes wrong with your computer or website.
  • Firewall = Use the protective measures which can protect you even if you can not react in time.

Real Challenges of Cyber Security

  • The world economic forum again rated cyber-attacks in top 5 risks to society
  • 46% of all companies were affected
  • 36% of all consumers globally lost data
  • 11% more was spent on cyber security this year

Generations of Attacks and Protections

First Generation ( Late 1980s)

Attack = Virus ( PC attacks – standalone)

Protection = The Anti Virus

Second Generations (Mid 1990s)

Attack = Networks ( Attacks from the internet)

Protections = The Firewall

Third Generations (Early 2000s)

Attack = Applications (exploiting vulnerabilities in applications)

Protections = Intrusion Prevention (IPS)

Fourth Generations (2010)

Attack = Payload (Polymorphic Content)

Protections = Behavioral Analysis

Top IT Security Salaries

  • Lead software security engineer – $233,333
  • Chief security officer – $225,000
  • Global information security director – $ 200,000
  • Chief information security officer – $192,500
  • Director of security – $178,333

Please follow and like us: