Docsity
Docsity

Prepara tus exámenes
Prepara tus exámenes

Prepara tus exámenes y mejora tus resultados gracias a la gran cantidad de recursos disponibles en Docsity


Consigue puntos base para descargar
Consigue puntos base para descargar

Gana puntos ayudando a otros estudiantes o consíguelos activando un Plan Premium


Orientación Universidad
Orientación Universidad

Ensayo en ingles sobre la ciber seguridad, Monografías, Ensayos de Inglés Técnico

Un ensayo sobre la ciber seguridad escrito en ingles

Tipo: Monografías, Ensayos

2022/2023

Subido el 21/11/2023

alejandro-al-maaz
alejandro-al-maaz 🇻🇪

1 documento

1 / 4

Toggle sidebar

Esta página no es visible en la vista previa

¡No te pierdas las partes importantes!

bg1
CYBERSECURITY
Cybersecurity is the practice of protecting systems, networks, and programs from
digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying
sensitive information; extorting money from users via ransomware; or interrupting normal
business processes. Implementing effective cybersecurity measures is particularly
challenging today because there are more devices than people, and attackers are becoming
more innovative.
A successful cybersecurity approach has multiple layers of protection spread across
the computers, networks, programs, or data that one intends to keep safe. In an organization,
the people, processes, and technology must all complement one another to create an effective
defense from cyber-attacks. A unified threat management system can automate integrations
across select Cisco Security products and accelerate key security operations functions:
detection, investigation, and remediation.
Users must understand and comply with basic data security principles like choosing
strong passwords, being wary of attachments in email, and backing up data.
Organizations must have a framework for how they deal with both attempted and
successful cyber-attacks. One well-respected framework can guide you. It explains how you
can identify attacks, protect systems, detect and respond to threats, and recover from
successful attacks.
Technology is essential to giving organizations and individuals the computer security
tools needed to protect themselves from cyber-attacks. Three main entities must be protected:
endpoint devices like computers, smart devices, and routers; networks; and the cloud.
Common technology used to protect these entities include next-generation firewalls, DNS
filtering, malware protection, antivirus software, and email security solutions.
In today’s connected world, everyone benefits from advanced cyberdefense
programs. At an individual level, a cybersecurity attack can result in everything from identity
theft, to extortion attempts, to the loss of important data like family photos. Everyone relies
pf3
pf4

Vista previa parcial del texto

¡Descarga Ensayo en ingles sobre la ciber seguridad y más Monografías, Ensayos en PDF de Inglés Técnico solo en Docsity!

CYBERSECURITY

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber-attacks. A unified threat management system can automate integrations across select Cisco Security products and accelerate key security operations functions: detection, investigation, and remediation.

Users must understand and comply with basic data security principles like choosing strong passwords, being wary of attachments in email, and backing up data.

Organizations must have a framework for how they deal with both attempted and successful cyber-attacks. One well-respected framework can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks.

Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber-attacks. Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud. Common technology used to protect these entities include next-generation firewalls, DNS filtering, malware protection, antivirus software, and email security solutions.

In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies

on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.

Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber-attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open-source tools. Their work makes the Internet safer for everyone.

TYPES OF CYBERSECURITY THREATS

Phishing

Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber-attack. You can help protect yourself through education or a technology solution that filters malicious emails.

Social engenering

Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.

Ransomware

Ransomware is a type of malicious software. It is designed to extort money by blocking

Attack surface management

Attack surface management (ASM) is the continuous discovery, analysis, remediation and monitoring of the cybersecurity vulnerabilities and potential attack vectors that make up an organization’s attack surface. Unlike other cyber-defense disciplines, ASM is conducted entirely from a hacker’s perspective, rather than the perspective of the defender. It identifies targets and assesses risks based on the opportunities they present to a malicious attacker.

Threat detection, prevention and response

Because it's impossible to stop all cyberattacks, organizations rely on analytics- and AI-driven technologies to identify and respond to potential or actual attacks in progress. These technologies can include (but are not limited to) security information and event management (SIEM), security orchestration, automation and response (SOAR), and endpoint detection and response (EDR). Typically, these technologies are used in conjunction with formal incident response plan.

Disaster recovery

While not cybersecurity technology per se, disaster recovery capabilities often play a key role in maintaining business continuity in the event of a cyberattack. For example, the ability to fail over to a backup hosted in a remote location can enable a business to resume operations quickly following a ransomware attack (and in some cases without paying a ransom).

Alejandro Al Maaz

ID 26.466.231.