DEFINITION OF SECURITY
Cyber security is the defense of computers, servers, mobile devices, electronic systems, networks and data against harmful attacks. It is also known as IT security or the security of electronic data. The term is broad and applies to everything that has to do with computer security, disaster recovery and guiding end users.
The US government spends $ 13 billion a year on cybersecurity, but warns that cyber attacks continue to develop at a rapid pace. To combat the spread of harmful code and to help with early detection, the National Institute of Standards and Technology (NIST) recommends continuous, real-time monitoring of all electronic means.
The threats against which cybersecurity protects are threefold: cybercrime, in which criminals attack systems alone or in a gang for financial gain; cyber war, often accompanied by information gathering and politically motivated, and cyber terror, which tries to undermine electronic systems and cause panic and fear. Methods that are often used by attackers to gain control over computers or networks are viruses, worms, spyware and trojans. Viruses and worms can copy themselves and damage files or systems, while spyware and trojans are often used to secretly collect data. The average user usually comes into contact with malicious code via an unsolicited e-mail attachment or by downloading programs that look legitimate, but in fact contain malware.
Protection of end-users
ow does cybersecurity protect users and systems?
First, cybersecurity relies on cryptographic protocols that are used to encrypt e-mails, files and other critical data. This not only protects information that is sent, but also protects against loss or theft. In addition, security software from end-users scans computers for malicious code. This code is quarantined and then deleted. In extreme cases, such as a startup sector virus, a computer can be completely erased.
Electronic security protocols also focus on malware detection, preferably in real time. Often, so-called ‘heuristic analysis’ is used to assess the behavior and code of a program, which contributes to the defense against viruses and trojans that can change shape with every execution (polymorphic and metamorphic malware). Because potentially harmful programs are run in a protected virtual environment that is separate from the user’s network, security programs can analyze actions and increase their knowledge about the behavior of malicious code. Cyber security is an evolving discipline that tries to protect electronic systems as well as possible against new threats.