[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Cyber Security

571

Solutions

893

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Share tech news, updates, or what's on your mind.

Sign up to Post

SecPIVOT
Take a step back to reflect where are we now and where we should be heading to in the next (and many more) tranches of getting to implement the RIGHT security. We need to build security PIVOT to stay in the cyber chase with the adversaries.
2
Active Protection takes the fight to cryptojacking
LVL 1
Active Protection takes the fight to cryptojacking

While there were several headline-grabbing ransomware attacks during in 2017, another big threat started appearing at the same time that didn’t get the same coverage – illicit cryptomining.

While there were several headline-grabbing ransomware attacks during in 2017, another big threat started appearing at the same time that didn’t get the same coverage – illicit cryptomining.
1
Artificial Intelligence
We’d all like to think our company’s data is well protected, but when you ask IT professionals they admit the data probably is not as safe as it could be.
1
LVL 24

Expert Comment

by:Andrew Leniart
Comment Utility
Great article that explains the importance of not just relying on definitions based security solutions. Thanks for writing this. Interesting read!

Endorsed.
1
In April 2018, the "SamSam" ransomware attack crippled the city of Atlanta. The recovery that followed provides a stark reminder of the real costs associated with ransomware – both technologically and financially.
0
On Sunday 16th September 2018 at 9.30am, Premium Credit - a number one insurance premium finance company in the UK and Ireland came under cyber attack.
0
LVL 5

Author Comment

by:Adrian McGarry
Comment Utility
Thanks Andrew
0
LVL 5

Author Comment

by:Adrian McGarry
Comment Utility
Thank you Andrew
0
ITSec vs CSec
I am sure that most of you will have chanced upon either of the terms like "Information (IT) Security" and "Cybersecurity" but do you know the differences and the implications as those threats evolve? Find out more in this article on the different security approaches that should be adopted.
2
Trade off - web cache poisoning
Web cache has been one of the performance options but though it serves well in enhancing the user experience, it can also inadvertently act as a point for attacks if it is not secured to reduce the exposure. Read on to find out the hidden threats in web cache.
2
LVL 24

Expert Comment

by:Andrew Leniart
Comment Utility
Bernard, this is excellent information written in a way that even a layman to the topic has a chance to understand. Please keep them coming.

Endorsed!
1
Wifi Flaw
Nothing is ever secure - things get "broken" but not always easily mended. This is the norm today. Despite security measure put in place, cyber attacks are still successful because security controls themselves can be vulnerable as well. Catch this Wi-Fi security weakness run through.
5
Secure HTTPS
HTTPS is an essential technology and the Chrome browser developed by Google now shows “Secure” in the address bar when you visit a page with the HTTPS protocol such as https://www.experts-exchange.com but what does this mean? Is the website secure from malware? Is our identity secure?
0
online safety

A recent Pew Research Center study reveals that one in three parents expresses concern about their children’s online activity. In today’s digital world, understanding the online activity of children is part of being a parent. Most people understand that virus protection and software updates are important for preserving online security. However, the personal habits and actions of young Internet users can affect their safety. 


Busy parents don’t always have time to stay informed about the latest Internet threats, making cybersecurity experts an invaluable resource for providing online safety information about protecting children and young adults. Still, parents must remain vigilant in staying informed about what social media platforms their children use as well as explaining the primary tenets of Internet safety.


Parents, as well as young Internet users, need cyber safety education. It’s important that youth understand how their social media activities affect their safety. It’s impossible to know who is reading and following media posts left by children, and security is often the last concern on the mind of an unsuspecting Internet user engaging with friends and family members.


Most parents make it a point to always know the whereabouts of their children. The same concern should apply to online activity. Parents should have a presence on their children’s gaming networks and social media platforms. Additionally, parents should have the account and password information of their children’s online accounts. Not to spy, but to verify their activities. Furthermore, it’s incredibly easy for unscrupulous individuals to track the real-world movements of children as they check into venues using online applications by using social media platforms such as Instagram, Snapchat, Facebook, and Foursquare. 


Keeping Kids Safe in the Digital Domain


Parents should do their best to teach their children about online safety. However, it shouldn’t be left to parents alone to keep their children safe online. Community advocates and cybersecurity specialists can pitch in and do their part to help keep kids safe in the digital domain. Additionally, there are paid services that parents can use to help protect their children online. Most computer literate children understand how to protect their online privacy and security. However, they only use this knowledge to keep their parents from observing their online activity. 


Unfortunately, most children don’t apply this same caution when engaging with strangers online. Just as they do in the real world, parents must figure out how to oversee their children’s Internet activity. Additionally, it’s important that they establish online monitoring while children are young so that it’s easier to protect them as they grow older.


Research shows that parents are the best defense for protecting kids, teens and young adults online. Parents can establish a foundation for monitoring their children’s Internet activity by explaining that they want to share in their online experience, not infringe on their privacy. This process is easier if parents maintain an ongoing dialogue with their children about Internet safety. Parents must make sure that their children understand how their online activity exposes personal information about their lives that build up over time. 


Getting Help With Cyber Safety


Social monitoring apps and other resources can help parents stay informed about their children’s online behavior and keep them safe. Experts recommend that parents monitor their children closely to protect them from inappropriate content and activities such as cyberbullying and online predators. Sometimes, dishonest individuals pose as children online. They may even encourage children to divulge personal information, such as their home address and phone number. In light of these threats, parents should always be aware of their children’s online activities, including the information that they share and the people that they engage with online.


All parents want to keep their children safe as they explore the Internet, learn new things and engage with others from around the world. There are many academic institutions, community organizations and law enforcement and government agencies that provide resources that teach parents how to protect children as they browse the Internet. In fact, there are many directories with hundreds of resources from around the world that are updated frequently, and many of those resources are available in different languages.


In today’s digital world, it’s vital that parents maintain an open dialogue about Internet safety. Additionally, it’s important that cybersecurity experts advocate for the safety of children as they use the Internet to enhance their lives. Cybersecurity experts are well aware of the dangers that children face online, and as new threats emerge daily, they continue to develop innovative solutions for protecting the public’s safety. 



0
Become a Leader in Data Analytics
Become a Leader in Data Analytics

Gain the power to turn raw data into better business decisions and outcomes in your industry. Transform your career future by earning your MS in Data Analytics. WGU’s MSDA program curriculum features IT certifications from Oracle and SAS.  

The biggest challenges when it comes to mobile security: protection, integration and visibility.
4

Expert Comment

by:Jake Lees
Comment Utility
Nice post. Love to read it.
0
Mobile security
Your smartphone is the weakest link so if we have not been taking good care of it and looking out for signs of red flag that the it is misbehaving and acting strangely, then we are setting ourselves for trouble. Read on for tips to self defence and keep a clean hygiene footprint.
2
LVL 68

Author Comment

by:btan
Comment Utility
Thanks Andrew.

1a. Facial spoofing attacks can easily launched via printed photos, video replays and 3D masks of a face. There is a detailed paper written on this. That is why it is critical to implement strong liveness detection measures for facial authentication that recognize when a facial image is not a live. To share a bit more, spoof detection can be classified as either “active”, requiring interaction with the subject, or “passive” analysis requiring no interaction.  

1b. Fingerprint spoofing attack can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. Likewise another paper shares the details. What I think is concerning is the capture in the past has also been attempted on gummy fingers that is fake Fingers. Liveness test is still the added assurance check needed to have a robust check in the mobile device.

The challenge for a/m is not on the detection technology but how to more towards a more accurate match rate an d at the same time not in the expense of making the device bulky or more draining to the limited battery level.

2. Actually remote wipe is more of a mitigation as ultimately, if the data remain encrypted and the device has lock enabled, access is restricted and even data siphoned off the shutdown or locked device will not necessary have the plain data revealed. So with encryption and locked setting, the mitigation suffice as baseline.

Hope the above clarifies.
1
LVL 24

Expert Comment

by:Andrew Leniart
Comment Utility
Thanks for clarifying btan. Highly useful information!
0
Secure Mobile DNA
The explosive trends of the increasing number of mobile devices and apps get us in trouble despite the benefits they give. Run through the common threats faced. Tackle them with a strategy to better secure our mobile device and apps against these emerging threats.
0
HIVE ALERT!
With a HIVE alert mind, we can focus on important security areas. We can ask the right questions to guide and discover ways to reduce our risk footprint and protect against lurking threats. Read on...
0
The New York State Cybersecurity Conference is held most years in Albany, New York. This year, like last, it was held in the Egg conference center in Nelson Rockefeller Plaza. This was the 21st annual conference. Here are some of my reflections ...
1
LVL 24

Expert Comment

by:Andrew Leniart
Comment Utility
Great overview of the conference. Thanks for sharing this. Endorsed!
0
Ransomware
Ransomware is a malicious software that encrypts a victim's data and makes it unusable until the victim pays the attacker a ransom fee in Bitcoin. Ransomware uses cryptography technology. Attackers decrypt the files only if the victims pays the bitcoin amount within a certain period of time.
0
LVL 8

Expert Comment

by:Naveen Sharma
Comment Utility
Thanks for sharing.

Ransomware attacks are becoming problematic for both individuals and businesses of all sizes.

The best and the most important mitigation techniques is to maintain secure backups and educate your employees.

Ways to Address Ransomware Attacks in Today’s Security Landscape:
https://www.lepide.com/blog/nine-ways-to-address-ransomware-attacks-in-todays-security-landscape/

Simple things you can do to protect against ransomware attacks:
http://expert-advice.org/security/ways-to-protect-yourself-from-ransomware-attack/
0
SIEM must examine concepts of normality and abnormality traffic/data flow patterns. SIEM need to constitute use of adaptive intelligence. Companies need to evaluate SIEM products based on their own objectives to determine the product that best meet their needs.
2

Expert Comment

by:Gökhan POLAT
Comment Utility
Great article 👍
0

Expert Comment

by:Ahmed Ali Khan
Comment Utility
Very detailed and insight information of SIEM solutions!
0
THREAT RISK TABLET
Know thy enemy but not yourself, wallow in defeat every time. We are fearful of what we do not know. Taking an extra step to self discover though we are not an expert is worthwhile to better focus and assess the cyber threat. Find out more in this article.
0
Technology has revolutionized how we create, share and comment on information. So does that mean that there are new ethical standards for information within the digital age? Read on to find out!
0
Cloud as a Security Delivery Platform for MSSPs
Cloud as a Security Delivery Platform for MSSPs

Every Managed Security Service Provider (MSSP) needs a platform to deliver effective and efficient security-as-a-service to their customers. Scale, elasticity and profitability are a few of the many features that a Cloud platform offers. View our on-demand webinar to learn more!

RISK approach
A conventional approach to security to just put in best of the breed security control is not enough. This will be a part of the series to get the RIGHT security in place and first off is to make sure proper risk assessment approach is adopted. Security need not be complex.
0
Playing the Triage Game
The intent of this article is not to tell you what solution to use (you know it better) or make a big bang change to your current regime (you are well aware of), but to share how the regime can be better and effective in streamlining the multiple patch implementation.
0
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
3
An Incident response plan is an organized approach to addressing and managing an incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
3
Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of them the instant they are no longer needed.
2
Stay Alert. Act fast.
To share tips on how to stay ALERT and avoid being the next victim - at least not due to your own poor cyber habits and hygiene!
2
LVL 13

Expert Comment

by:Scott Silva
Comment Utility
Good article, but maybe a bit of grammar polishing would make it better... It seems to drift from first person to third person and back, and for an old time technical proofreader like me, it just jumps out...  Not nit picking, but a lot of people might be reading it in the future...
0
LVL 68

Author Comment

by:btan
Comment Utility
Thanks Scott for the comments, I have done some revision.
0

Cyber Security

571

Solutions

893

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.