(This video chapter begins at 00:50 and ends at 02:19. Click on the blue dot at the 00:50 timestamp to play the video for this module.)
Before developing and implementing security measures to prevent cyberattacks, you must understand basic concepts associated with cyber security and what cyberattacks are. The method(s) of cyber security that a company uses should be tailored to fit the needs of the organization.
Our focus quote for this module:
“U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations, subnational groups, and individual hackers.” – John O. Brennan
Cyberspace is the environment where computer transactions take place. This specifically refers to computer-to-computer activity. Although there is no “physical” space that makes up cyberspace, with the stroke of a few keys on a keyboard, one can connect with others around the world.
Examples of items included in cyberspace are:
As previously mentioned, cyber security is the implementation of methods to prevent attacks on a company’s information systems. This is done to avoid disruption of the company’s productivity. Not only does cyber security include controlling physical access to the system’s hardware, it protects from danger that may come via network access or the injection of code.
Cyber security is crucial to a business for a myriad of reasons. The two this section will focus on are data security breaches and sabotage. Each can have dire effects on a company and/or its clients.
Data security breaches can compromise secure information such as:
Computer sabotage serves to disable a company’s computers or network to impede the company’s ability to conduct business.
In simple terms, a hacker is an individual, or group of individuals, who use their knowledge of technology to break into computer systems and networks, using a variety of tools to gain access to, and utilize other people’s data for devious reasons.
There are 3 main types of hackers. They are:
Patrick and Willow are in the process of opening a small answering service business. They are discussing the various needs of the company, including the type of security they are going to use for their computer systems. Patrick tells Willow that he doesn’t believe it’s necessary to implement any type of computer security because their business is small. Willow states even though their business will start out small, they are still vulnerable and there are many hackers out there that can break into their system and disrupt business.