WHAT IS CYBERSECURITY?
The electronic information network connected has become an integral part of our daily life. All types companies, medical, financial and educational institutions use this network to work effectively. They use the network for acquire, process, store and share large amounts of digital information. Given that it is collected and shared an ever-increasing amount of information, the protection of this information is becoming increasingly essential for national security and economic stability.
Cybersecurity represents the constant commitment to protect the interconnected systems and all the data associated with the systems from unauthorized use and damage. On a personal level, it is necessary to safeguard identities, data and processing devices.
At the company level, it is everyone's responsibility to protect the company's reputation, data and customers. At the state level, they are national security, the protection and well-being of citizens are at stake.
YOUR DATA
Any information about you can be considered personal information. Personal data can uniquely identify you as an individual. This data includes photos and messages exchanged online with your family and with friends. Other information such as name, social security number social, date and place of birth or girl's name of the mother are
known to you and used to identify you. Also information such as data medical, financial, working and educational qualifications can be used for identify yourself online.
YOUR MONEY
If you have something of value, criminals want it.
Your online credentials are very valuable. These credentials give thieves access to your accounts. You could think that miles earned on frequent flights are not important to cyber criminals. Not anymore. After violating about 10,000 American Airlines and United accounts, cyber criminals have booked and modified flights for free using stolen credentials. Although miles earned on frequent flights have been returned to customers since airlines, this demonstrates the value of access credentials. A criminal could also use yours relations. You could access your online accounts and your reputation by tricking yourself into sending money to relatives and friends. The criminal can send messages stating that relatives or friends need your transfer for go home after losing your wallet.
Criminals use a lot of imagination in trying to trick you into getting your money delivered. Not only do they steal yours money, they can also steal your identity and ruin your life.
CORPORATE DATA
Company data includes personal information, intellectual property and financial data. Personal information include applications, pay slips, offer letters, contracts with the employer and any information used for hiring decisions. Intellectual property, such as patents, registered trademarks and plans for new products, allows the company to gain an economic advantage over the competition. This intellectual property can be considered a trade secret; the loss of this information can be disastrous for the future of the company. The data financial, such as a company's tax return, balance sheet and cash flow statement offer an overview on the state of health of the company itself.
THREATS
The attacks can originate from within the company or from the outside as shown in the figure. An internal user as a employee or contract partner, may accidentally or purposely.
WHY COMPANIES NEED CYBERSECURITY?
The features and characteristics of cybersecurity have been explained. The reasons for which the demand for cybersecurity professionals will continue to grow. The reasons that were explained in the content make online identity and data vulnerable to cybercriminal attacks. Some suggestions were offered on how to protect personal identity and online data.
Company data was also processed: what they are, where they are and why they need to be protected. They were described the authors of cyber attacks and what they want. Cybersecurity professionals must have the same skills of the authors of the attacks. Cybersecurity professionals must comply with local, national and
International. Cybersecurity professionals must also use their skills ethically.
Finally, the cyber war was briefly discussed and the reasons why nations and governments need professionals of cybersecurity to help protect citizens and infrastructure.
ARE YOU READY FOR THE CYBER WAR?
Congratulations @indianaj! You have completed the following achievement on the Steem blockchain and have been rewarded with new badge(s) :
You can view your badges on your Steem Board and compare to others on the Steem Ranking
If you no longer want to receive notifications, reply to this comment with the word
STOP
Do not miss the last post from @steemitboard:
Vote for @Steemitboard as a witness to get one more award and increased upvotes!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Congratulations! This post has been upvoted from the communal account, @minnowsupport, by indianaj from the Minnow Support Project. It's a witness project run by aggroed, ausbitbank, teamsteem, someguy123, neoxian, followbtcnews, and netuoso. The goal is to help Steemit grow by supporting Minnows. Please find us at the Peace, Abundance, and Liberty Network (PALnet) Discord Channel. It's a completely public and open space to all members of the Steemit community who voluntarily choose to be there.
If you would like to delegate to the Minnow Support Project you can do so by clicking on the following links: 50SP, 100SP, 250SP, 500SP, 1000SP, 5000SP.
Be sure to leave at least 50SP undelegated on your account.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit