Wednesday, February 3, 2016

My Take on Information and Cyber Security Defense

Information and Cyber security have never been more critical than today as computer and control systems are increasingly connected to the Internet and they have become targets of enemies and attackers from inside and outside of organizations. Therefore we need to continuously find better approaches to protect our systems against increasingly sophisticated attacks. Specifically, attempts to compromise the confidentiality, integrity and/or availability of systems are on the rise. The first line of defense is to have preventive measures such as strong authentication, access control, and encryption. However, it has been proven time and time again that preventive measures alone are not sufficient to protect ever sophisticated and interconnected systems we currently have. As we all know, it is an elusive goal to build exploit free systems due to, but not limited to, design and implementation errors, configuration errors, vulnerabilities in the third-party systems and libraries, and social engineering attacks. For example, buffer overflow vulnerability has been known for many decades, but we are still hearing damaging attacks exploiting this vulnerability in current systems. Given the disadvantaged situation we are in, what can we do to protect our systems? In my humble opinion, there is no single silver bullet solution that solves the issue. Instead we should take a holistic approach where multiple lines of defense are utilized along with attack detection and mitigation techniques.

21 comments:

ICS Cyber Security said...

Your blog is very helpful and informative. Thanks for sharing great information.
cloud based disaster recovery

world cricket championship 2apk said...

Nice post but I think it should be more clearly!

Anonymous said...

thanks for sharing the information.Indian Cyber Army is announcing “ Summer Internship 2018” on “ Ethical hacking and Cyber Crime Investigation” for the enthusiasts of Cyber security. Here internship will give you on-the-job experience, help you learn whether you and Cyber security industry are a good match and can provide you with valuable connections and references. Here interns are usually exposed to a wide variety of tasks and responsibilities which allows the intern to showcase their strengths by working on projects for various managers that work on different parts of Indian Cyber Army. Becoming a high performing intern is a fantastic way to improve your employment prospects. This internship can be a great way to get your foot in the door of success with a prestigious or desirable Organization

Pet Lover said...

Hi, the information you have shared in your blog is awesome and valuable. You should start blog in WordPress. If you want to create your own blog in WordPress, start it today and start writing contents. You can check information for the best WordPress Hosting Here.

Anonymous said...

Thank You so much for helping me by sharing your great information!!!
Linux VPS Server Hosting

ALA HOSTELS said...

Hi, Honestly, it's a Nice Article
If you are looking for the best Cloud Solutions that will be helpful for your business. We provide efficient methodologies for the successful implementation of Cloud computing business solutions | cloud computing companies in Madhapur | Cloud Computing Services in Madhapur | cloud computing companies in Hyderabad | cloud computing services companies in India | cloud computing solutions companies.
Thank you!

Ace Myhomework said...

Such a nice blog and I appreciate your all efforts about your thoughts. It’s really good work. well done.

managed security services

Indivar Software Solutions Pvt. Ltd. said...

Great Post!! Thanks for sharing a very nice and useful information. It's really helpful for us.
sap softwares
big data services
Software integration Services
Cyber Security Service
Network Security Service

Anonymous said...

Really helpful article. But learning about cyber security is not that easy for a person who does not belong to this field but want to learn more about cyber security course. I also heard there is few online E-learning platform like Techourse.com that offers Cyber Security Course along with certifications.

Sunny Nehra said...

Awesome Article Bro

Steve said...

Sunny Nehra Bro
Cyber Security Professional
Sunny
Nehra
Nehra Sunny
Sunny Nehra
undefined

United Security Patrol said...

security firm with a new approach to providing both quality and thorough best
Armed Guard Services and unarmed security guards as well as patrol services. We are licensed, bonded and insured. Professionally trained security officers can make a world of difference in a secured site or an unfortunate occurrence.

Anonymous said...

Thank you for sharing such a wonderful blog on cyber security. These days cyber security is very important for every business. You need a team that knows how to prevent cyber threats before they happen. Protect your business from cyber-attacks with the latest technology and cyber security services.

Securityium said...

Application security risk assessment is a vital process in modern-day online security systems. The process involves identifying, assessing, and managing potential risks to an application. These risks range from cyber criminals to user errors, malware, system errors, and network failures. Conducting periodic application security risk assessments allows organisations to identify vulnerabilities and areas that need improvement in their security systems. By identifying these areas, companies can remediate the risks and prevent future exposures. Businesses must invest in application security risk assessments to ensure the safety of their assets, customers, and employees. With this essential practice, organisations can avoid exposing their sensitive information to outsiders and creating business disruptions that could have been avoided. https://www.securityium.com/
link Cyber Security Solutions in Europe

Tech Pundit said...

Thank you so much for sharing. I have found it extremely helpful… Discover comprehensive and cutting-edge cyber security solutions tailored for businesses in Adelaide and Brisbane at Tech Pundit. Safeguard your digital assets, secure sensitive data, and stay one step ahead of evolving threats with our expert team of security professionals. Protect your organization from cyber attacks and fortify your online presence with our robust suite of services. Don't compromise on security - choose Tech Pundit for peace of mind in the digital realm

Anonymous said...

Best Security Services Surrey Bc

Vizio - SAP Consulting Services said...

Amazon QuickSight is a cloud-based business intelligence (BI) and analytics service offered by Amazon Web Services (AWS). It allows users to create and share interactive dashboards, visualizations, and reports from a variety of data sources. QuickSight offers powerful machine-learning capabilities that can help businesses uncover insights and patterns that they might have otherwise missed. This makes it a valuable tool for businesses looking to gain a competitive edge by using their data to inform their decision-making processes. Overall, Amazon QuickSight consulting services is a powerful, user-friendly, and cost-effective tool for businesses looking to analyze their data more effectively.

togearmarketing said...

Awesome detailed blog
Keep it up and visit us
led signs red deer

Robert Kennedy said...

Thank you for sharing this article with us. It is always better to be safe than sorry. Building a good cyber defence is a must in these modern days. Contact us for assistance with Cyber Security Providers

cyber security certifications said...

Thank you for sharing this article with us.
DefendTech Chronicles is a powerhouse of cybersecurity information. The blog excels in breaking down complex topics into easily understandable pieces. The expert opinions and industry trends discussed here contribute to a comprehensive understanding of cybersecurity challenges and solutions. It's a must-read for professionals looking to enhance their knowledge and skills.

Anonymous said...

Thank you for valuable informationCyber security services