top of page
Search

CYBER SECURITY



In the modern age, cybercrime is increasing, and is needed that we learn more and more each day about cyber security and some ways in which we can protect our self, considering that we all use not only social networks, but online banking and many other things that we can do online, which bring us easy way, but in some cases, very dangerous.


Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices, and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.


We have 5 types of cyber security:

  • Critical Infrastructure Cybersecurity. ...

  • Network Security. ...

  • Cloud Security. ...

  • Internet of things security

  • Application Security.


Critical Infrastructure Protection is the need to protect a region's vital infrastructures such as food and agriculture or transportation.

Also, critical infrastructure includes the vast network of highways, connecting bridges and tunnels, railways, utilities, and buildings necessary to maintain normalcy in daily life. Transportation, commerce, clean water, and electricity all rely on these vital systems. Every government in every nation has a responsibility to protect this essential critical infrastructure against natural disasters, terrorist activities, and now cyber threats.


Network security is a broad term that covers a multitude of technologies, devices, and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies. Network security is important for home networks as well as in the business world. Most homes with high-speed internet connections have one or more wireless routers, which could be exploited if not properly secured.


Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion. It is important because with cloud storage your data is backed up to the cloud rather than stored on-site or nearby. Cloud security prevents this issue, as the data is stored in remote locations, protecting your business from the threat of data loss. It is important because with cloud storage your data is backed up to the cloud rather than stored on-site or nearby. Cloud security prevents this issue, as the data is stored in remote locations, protecting your business from the threat of data loss.. ...


Internet of thing security (IoT) is the practice that keeps your IoT systems safe.

IoT security tools protect from threats and breaches, identify and monitor risks and can help fix vulnerabilities.

IoT security ensures the availability, integrity, and confidentiality of your IoT solution.


Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification. Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention. Together, these factors determine your overall risk.


What can we do to improve our cybersecurity? The first step in protecting ourself is to recognize the risks, which can be:

-Hacker, attacker, or intruder – we alredy know that this are people who seek to exploit weaknesses in software and computer systems for their own gain, motivated by curiosity, their actions are typically in violation of the intended use of the systems they are exploiting.


-Malicious code - is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer.

-Vulnerabilities- are flaws in software, firmware, or hardware that can be exploited by an attacker to perform unauthorized actions in a system.

- Use strong passwords- Select passwords that will be difficult for attackers to guess, and use different passwords for different programs and devices. It is best to use long, strong passphrases or passwords

-Keep software up to date- Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it.

-Install a firewall- may be able to prevent some types of attack vectors by blocking malicious traffic before it can enter a computer system, and by restricting unnecessary outbound communications.


-Be careful about unexpected emails- phishing emails are currently one of the most prevalent risks to the average user. The goal of a phishing email is to gain information about you, steal money from you, or install malware on your device.


Our organization is dedicated to educating our members about cyber security and with that idea created CTAIU-Cyber Threat Analysis Intelligence Unit.

CTAIU is s a program that aims to prevent cybercrime and the dangers that appear in the daily life of the citizen.


The IPO Cyber Threat Analysis Intelligence Unit - CTAIU represents a force multiplier for Law Enforcement looking to update their response and detection programs to deal with increasingly sophisticated advanced persistent threats. Malware is an adversary's tool but the real threat is the human one, and cyber threat intelligence focuses on countering those flexible and persistent human threats with empowered and trained human defenders.


The IPO Cyber ​​Threat Analysis Intelligence Unit will train the law enforcement agencies teams in the tactical, operational, and strategic skills of cyber threat intelligence to make the security teams better and more accurate in cyber threat hunting.


By Sanela Nikolic, Police Officer, Crime Analyst

IPO Headquarters - Coordination Director


172 views0 comments
bottom of page