top of page

cybersecurity

BANNERCY.png

What is Cybersecurity?

How many times have you heard of Cyber Security today? I bet many and I imagine there are many times that you are asked: But what is it and what does it consist of ?!

Let's start with the translation of the word itself: Cyber Security stands for Information Security or Electronic Information Security. On wikipedia we read:

«With the term Cyber Security yes  they often emphasize the qualities of resilience, robustness and reactivity that a technology must possess in order to face attacks aimed at compromising its correct functioning and performance " 

For Kaspersky – Global Cybersecurity Company founded in 1997  «Cyber security is the practice of defending computers  and servers, mobile devices, electronic systems, networks and data from dangerous attacks "

In fact, Cyber Security must guarantee:

  • Network security: Defending computer networks from the actions of malicious people, whether it is targeted attacks or opportunistic malware.

  • Application security: protect software and devices from potential threats. A compromised application can allow access to the data it is supposed to protect. Effective security begins at the design stage, long before a program or device is deployed.

  • Information security: protect the integrity and privacy of data

  • Operational Security: Includes processes and decisions for managing and protecting data assets. It includes all permissions used by users to access a network and the procedures that determine how and where data can be stored or shared.

But from what or from whom do we have to defend ourselves?

We must defend ourselves against both external and internal attacks.

As for external attacks, the attacker tries to break in through the vulnerability exploit or through cracks in the security perimeter.

While for internal attacks the attacker either uses an insider or is a person inside the organization. Internal attacks are the most difficult to counter and predict precisely because they start from within the perimeter to be protected.

Furthermore, attacks can be either targeted or opportunistic:

  • in the first case the recipient is chosen a priori, usually persistent attacks tend to remain invisible as much as possible and aim to control the attacked system;

  • in the second case they take place on a large scale, they do not have a single subject towards which to direct the attack but aim to hit as many recipients as possible.

And what are the paths to become one? We at LINKZEROAREA offer you 2 types of courses depending on your academic and professional background.

Find out which one is right for you!

  • Data Protection Officer (DPO) Course

  • Cyber Security Expert Course

Scheda_cyber.jpg
bottom of page