Use Wireless Networks Safely

Use Wireless Networks Safely Wireless networks allow Wi-Fi enabled devices, such as laptops and tablets, to connect to the network by way of the network identifier, known as the Service Set Identifier (SSID). To prevent intruders from entering your home wireless network, the pre-set SSID and default password for the browser-based administrative interface should be..
Read More..

 

Protect Your Computing Devices

Protect Your Computing Devices Your computing devices store your data and are the portal to your online life. Below is a short list of steps you can take to protect your computing devices from intrusion: Keep the Firewall On – Whether it is a software firewall or a hardware firewall on a router, the firewall..
Read More..

 

Protecting Your Data and Privacy

Protecting Your Data and Privacy his chapter focuses on your personal devices and your personal data. It includes tips for protecting your devices, creating strong passwords and safely using wireless networks. It also discusses maintaining your data securely. Your online data is worth something to cyber criminals. This chapter briefly covers authentication techniques to help..
Read More..

 

The Purpose of Cyberwarfare

The Purpose of Cyberwarfare The main purpose of cyberwarfare is to gain advantage over adversaries, whether they are nations or competitors. A nation can continuously invade other nation’s infrastructure, steal defense secrets, and gather information about technology to narrow the gaps in its industries and military. Besides industrial and militaristic espionage, cyberwar can sabotage the..
Read More..

 

What is Cyberwarfare?

What is Cyberwarfare? Cyberspace has become another important dimension of warfare, where nations can carry out conflicts without the clashes of traditional troops and machines. This allows countries with minimal military presence to be as strong as other nations in cyberspace. Cyberwarfare is an Internet-based conflict that involves the penetration of computer systems and networks..
Read More..

 

Ethical Issues in Cybersecurity

Ethical Issues in Cybersecurity In addition to working within the confines of the law, cybersecurity professionals must also demonstrate ethical behavior. Personal Ethical Issues A person may act unethically and not be subject to prosecution, fines or imprisonment. This is because the action may not have been technically illegal. But that does not mean that..
Read More..

 

Legal Issues in Cybersecurity

Legal Issues in Cybersecurity Cybersecurity professionals must have the same skills as hackers, especially black hat hackers, in order to protect against attacks. One difference between a hacker and a cybersecurity professional is that the cybersecurity professional must work within legal boundaries. Personal Legal Issues You do not even have to be an employee to..
Read More..

 

Internal and External Threats

Internal and External Threats Internal Security Threats Attacks can be originated from within an organization or from outside of the organization, as shown in the figure. An internal user, such as an employee or contract partner, can accidently or intentionally: Mishandle confidential data Threaten the operations of internal servers or network infrastructure devices Facilitate outside..
Read More..

 

Types of Attackers

Types of Attackers Attackers are individuals or groups who attempt to exploit vulnerability for personal or financial gain. Attackers are interested in everything, from credit cards to product designs and anything with value. Amateurs – These people are sometimes called Script Kiddies. They are usually attackers with little or no skill, often using existing tools..
Read More..

 

Security Breach Example 2

Security Breach Example 2 The high tech toy maker for children, Vtech, suffered a security breach to its database in November 2015. This breach could affect millions of customers around the world, including children. The data breach exposed sensitive information including customer names, email addresses, passwords, pictures, and chat logs. A toy tablet had become..
Read More..