Module 2 – Human Resources Today


(This video chapter begins at 00:50 and ends at 02:19. Click on the blue dot at the 00:50 timestamp to play the video for this module.)

 

 

Cyber Security Fundamentals

Before developing and implementing security measures to prevent cyberattacks, you must understand basic concepts associated with cyber security and what cyberattacks are. The method(s) of cyber security that a company uses should be tailored to fit the needs of the organization.

Our focus quote for this module:

U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations, subnational groups, and individual hackers.” – John O. Brennan

 

What is Cyberspace?

Cyberspace is the environment where computer transactions take place. This specifically refers to computer-to-computer activity. Although there is no “physical” space that makes up cyberspace, with the stroke of a few keys on a keyboard, one can connect with others around the world.

Examples of items included in cyberspace are:

  • Networks
  • Devices
  • Software
  • Processes
  • Information storage
  • Applications

 

What is Cyber Security?

As previously mentioned, cyber security is the implementation of methods to prevent attacks on a company’s information systems. This is done to avoid disruption of the company’s productivity. Not only does cyber security include controlling physical access to the system’s hardware, it protects from danger that may come via network access or the injection of code.

Why is Cyber Security Important?

Cyber security is crucial to a business for a myriad of reasons. The two this section will focus on are data security breaches and sabotage. Each can have dire effects on a company and/or its clients.

Data security breaches can compromise secure information such as:

  • Names and social security numbers
  • Credit card and bank details
  • Trade secrets
  • Intellectual property

Computer sabotage serves to disable a company’s computers or network to impede the company’s ability to conduct business.

 

What is a Hacker?

In simple terms, a hacker is an individual, or group of individuals, who use their knowledge of technology to break into computer systems and networks, using a variety of tools to gain access to, and utilize other people’s data for devious reasons.

There are 3 main types of hackers. They are:

  • Grey hats: These hackers do so “for the fun of it”.
  • Black hats: These hackers have malevolent reasons for doing so, such as stealing and/or selling data for monetary gain.
  • White hats: These hackers are employed by companies to hack into systems to find where the company is vulnerable, with the intention of ensuring the safety of the data from hackers with ill intentions.

 

 

Practical Illustration

Patrick and Willow are in the process of opening a small answering service business. They are discussing the various needs of the company, including the type of security they are going to use for their computer systems. Patrick tells Willow that he doesn’t believe it’s necessary to implement any type of computer security because their business is small. Willow states even though their business will start out small, they are still vulnerable and there are many hackers out there that can break into their system and disrupt business.