“…A computer system is no more secure than the persons responsible for its operation…”

Cybersecurity, is much more than information security applied to IT assets.

Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved.

There are a big number of different vulnerabilities in relation of the type of assets:
a) Denial-of-service attack
b) Backdoors
c) Exploits
d) Direct access attacks
e) Eavesdropping
f) Indirect attacks

There are different type of countermeasures:

1) Security and systems design
2) Security measures
3) Difficulty with response
4) Reducing vulnerabilities
5) Security by design
6) Security architecture
7) Hardware protection mechanisms
8) Secure operating systems
9) Secure coding
10) Capabilities and access control lists
11) Hacking back

To expand the details about these topics and others in relation of Cyber Security,
see here:

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.