CYBER SECURITY: PROTECTING THE DIGITAL GOLD

in #honoureelast year

Before the era of technologies, the civilizations have been recording data’s through writing in keeping them in shelves. How do they keep these data’s? Rewriting it over and over again. These method of recording and record keeping, is much exposed for the informations to be altered or removed permanently. Although the creation of the first modern computer is not really used in recording the people’s data, rather it is used in military data keeping. But the essence of it of recording data’s more secure is there. But the threats does not leave. It also upgrades and flows together with the time. As we march to modernization, the threats also march to be powerful.
Since the creation of first computing device, the threat of data breach have always been present. On modern day, computers are widely used in different industries with different platforms. With this our informations are the digital gold and becomes vital upon using the modern devices. Even with modern way of securing our devices the threats also becomes scarier. These attacks could be any software attacks such as virus, trojan, or worm. This could also be any form of malware such as adware, ransomware or spyware. Adware may not be as threatening as it seems but this malware but this violates the privacy of the user through displaying advertisements to their computer or programs. Ransomware locks certain informations and ask for ransom for the user to have access on that informations again. Lastly spyware, from the word spy, it monitors the users activities and share these informations to a certain party. The mentioned malwares and software attacks could be the reason for us in losing our data’s.
In cyber security we have what we called vulnerabilities. This could be present in which a system does not have enough wall of defences to protect their information. These could be the weak passwords, the transfers, creation, use and destruction of data, and unsafe connection between systems or network components. When there is a loss of data because of the vulnerabilities, it is what we call risk. The results could be the loss of privacy, financial losses, altering our data’s, and even deleting our data’s. As people that are mostly using technologies on our daily activities we must equip ourselves with knowledge to protect our modern treasure in the digital world.
In order for us to protect ourselves from these attacks we must remember the three categories of information security control. First is prevention. This is to have a strong keys to protect your accounts we could also enable our wall to prevent unauthorized access. Second is to detect, this is to detect any attempts of cyber security breach or maybe a success attacks to alarm the person in charge for the matter. Lastly, this is corrective, this minimizes the loss or damage to our systems and to restore critical systems.
These information security controls comes in different forms. This could be in a form of access controls, procedural controls, technical controls, and compliance controls. Access controls includes the physical security such as alarms, security guards, fences, vaults, locks and etc. The procedural controls are the awareness and training programs for the staffs. Technical controls are computer software protectors like firewalls, anti-virus systems, verification systems and the like. Compliance controls includes the laws that protects the privacy of users, the standards of cyber security and security frameworks.
In conclusion, knowledge is not just enough. It is the work and application of these knowledge is important. It is important to note that applying security measures should not be very strict to the point that it will be a nuisance to the users point of view. Our data's are the modern gold in digital world. This possesses great value that if someone steals it, it could be the start of the dark age of the user.

Posted using Honouree