Reference no: EM133528983
Assignment:
Concluse this all bellow the essays
Introduction
First, what is cybersecurity? According to Cisco, cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. In otherword Cybersecurity is the process of defending against attacks through the internet and illegal access on computers, servers, mobile devices, electronic systems, networks, and data. Cisco is a very reliable company in terms of cybersecurity. For a variety of businesses and industries, the company has been at top priority in creating and offering cybersecurity solutions. They are a dependable source of information on the subject due to their knowledge and experience.
I have been caught up in a cyber incident that has exposed personal data, including bank account and contact details, to hackers. I experienced this on October 28, 2022. They sent me an alert that message said your card was used on 10/28/2022 at 16:30 EST for $1691.65. If you do not recognize this transaction, contact us at +18665521604. When I saw this message, I just called them and asked them. I got the message, and she said your name is Adina Tesema You bought earphones from an Apple store for $142 I told her yes, and she says "you know your IP address is public, so for that reason one of the attempts to transact your checking account By Debra White anyway download the remote control app from your desktop, check your IP address", and I asked her why I downloaded this app and she said "I will help you stop her from doing this.
Just do it and let me do my job", so then I just do whatever she says to me. After that, my account, which I had with my checking account for $700, was taken. After she did that, she asked me to transfer money from savings to checking. At that time, I was aware I was hacked, and I hung up the phone and called my bank. They immediately changed my bank information, and they helped me.
Body:
Main Point One: Understanding Cybersecurity and the Importance of Cybersecurity:
Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital threats and unauthorized access. It encompasses a range of measures, technologies, and strategies aimed at preventing, detecting, and responding to potential security breaches. Cybersecurity is crucial in maintaining the confidentiality, integrity, and availability of digital information.
Importance of Cybersecurity:
1. Protection of Confidential Information: Effective cybersecurity measures safeguard sensitive information, including personal data, financial records, and intellectual property, preventing unauthorized access or disclosure.
2. Continuity of Operations: Cybersecurity ensures the uninterrupted functioning of critical systems and networks, minimizing disruptions and mitigating the impact of potential cyber-attacks.
3. Protecting Privacy: Cybersecurity measures protect individuals' privacy rights by preventing unauthorized surveillance, data collection, or misuse of personal information.
5. Building Trust and Confidence: Strong cybersecurity practices instill confidence among users, clients, and partners, enabling secure digital transactions and fostering trust in online environments.
Main Point Two:Cybersecurity Threats
Here is the main types of cybersecurity threats
- Malware attack.
- Social engineering attacks.
- Software supply chain attacks.
- Advanced persistent threats (APT)
- Distributed denial of service (DDoS)
- Man-in-the-middle attack (MitM)
- Password attacks.So lets see some of them
Malware is the most common type of cyberattack. There are many types of malicious software Malware is malicious software that can block access, install additional harmful software, and disrupt systems. There are four typical types of malicious software: Trojans, spyware, viruses, and ransomware This plan should be a part of the organization's security and data protection policy Malware is software designed to gain unauthorized access to or damage a computer, harming the user. .
Cisco reports that malware, once activated, can:
.Block access to key network components (ransomware)
.Install additional harmful software.
.Covertly obtain information by transmitting data from the hard drive (spyware).
.Disrupt individual parts, making the system inoperable.
Phishing is a cyberattack that steals sensitive data using email, SMS, phone, social media, and social engineering. The most frequent hack is phishing, although it can be avoided with technology and education. Fake solicitation is used as a hoax to obtain sensitive information. Phishing is a type of social engineering that is employed to steal private information. Phishing is a type of identity theft in which a con artist poses as a legitimate-looking email sender in order to deceive recipients into disclosing private information.
Transition to Main Point Two: To create effective security measures and protocols, companies and individuals must have an in-depth knowledge of the a lot cybersecurity threats.
Main Point Three: Cybersecurity Measures and Defense
To combat cybersecurity threats effectively, organizations and individuals must implement robust security measures. This includes utilizing strong and unique passwords, regularly updating software and operating systems, and employing reliable antivirus and firewall protection. Education and awareness programs can also play a crucial role in helping individuals identify and mitigate potential threats. Organizations should establish comprehensive cybersecurity policies and procedures, conduct regular vulnerability assessments, and implement incident response plans to minimize the impact of cyber attacks.