What Is Cybersecurity?
It is only when they go wrong that machines remind you how powerful they are - Clive James
The content you are reading is written using a computer and shared via network servers. Almost everything we do, we depend upon today, is codified by data. As we become more and more dependent on technology, the global cyber threat is increasing and evolving continuously. Hence today, choosing cybersecurity techniques are more of a necessity than a choice.
RELATED READ: Cybersecurity and the Requirement of a Resilient Environment in Australia
Cybersecurity is a pool of technologies, processes and practices which are designed to protect networks, electronic devices, data and programs from digitally processed malicious attacks, damages or any unauthorised access. Cyberattacks are engineered to access or destroy the official/personal information, and it can be misused to extort money from the users or to interrupt normal processes.
Society is already intertwined with not only the internet but to the evolving age of automation, Big Data, and the Internet of Things (IoT). As technology has played a substantial role in bettering our lives, it also brings threats. It has become a paramount priority to protect our technology from cybercrimes, industrial espionage, and cyberattacks.
ALSO READ: Technology has changed the way we work amid the COVID-19 crisis: A look at in-demand technologies
What are the different forms of cyber threats?
There are three typical cyber threats identified:
Why do we hear about Cybersecurity so often?
Executing effective cybersecurity measures is considered challenging nowadays as the number of devices has increased more than the number of people in the world and the cyber attackers are becoming more innovative than before.
Notably, a constructive cybersecurity initiative has multiple layers of protection spread across various aspects. Computers, networks, programs or data are protected using these measures. For instance, in an organization, not just the processes and technology but its data and the peoples' information are also protected to create an effective defense from cyberattacks. The security system integrates these across various platforms in order to function in the below domains:
RELATED READ: Knock Knock! Cybercriminal at Your Doorstep
The computers and phones we use, planes we fly, schools we study, offices we work at, banks we keep our money safe, and overall the society’s functioning are all primarily dependent on technology. Hence the issue of cybersecurity stands as vital as the technology itself. If we want to protect our way of life from being hacked, manipulated, and controlled, cybersecurity is required.
With technology reaching door to door, the hacking has become more common. Any system can be breached by hacking it via one click on an unwanted email. The person clicking on it may not know what it has gotten into; the firewall and security softwares may not help you by then. Mobile call fraud is also widespread when a person may innocently end up giving its personal information which can be used to hack bank or email accounts or blackmailing.
Why is cybersecurity critical?
At an individual level, phishing can take place to extract personal information or financial statements by a fraudulent person disguised as a legitimate representative. Not just the computer system but the autonomous cars and transports system can also fall in the hands of hackers and cybercriminals to abuse. Wearables such as smartwatches which capture data related to health, location can be targeted for phishing or identity theft.
Man-in-the-middle attacks are a kind of a communication breach where the criminal can violate the communication privacy and record calls between two individuals and use it to blackmail.
How can we address Cybersecurity?
Micro Level:
Macro Level: