Cyber Defense Magazine – July 2019

(Sean Pound) #1

What Does Breach Prevention Mean?


By Milica D. Djekic


When we talk about the cyber breaches, we would mean any attempt of the hacker’s community to
approach our IT system and conduct some malicious activities there. So, today’s IT environment got very
vulnerable to any kind of the sabotage, espionage and reputation compromise. Some experts would
suggest that the best way to prevent any computer or network breach is to rely on the good cryptography.
The both – endpoints and communications – could get breached at any time and it’s only about how
successfully we would manage such a risk. For instance, the endpoint breach is not impactful if data are
encrypted, so we should adopt the good practice in sense of smarter threat management and response.
Indeed, the threat is something that would deal with the likelihood for some unwanted occurrence
happens and if we use our skills and experiences in order to develop the certain level of immunity to
those attacks – we can expect to get much more secure.


On the other hand, the attempt to breach the communications line could bring more success for a reason
the web communications would cope with the TCP/IP information transfer, so the majority of the current
cybercrime groups would get the tools for such purposes. As it’s quite well-known, the black market would
be full of the hacking solutions and that would open up an opportunity to the bad guys to simply make
the breach to your computer or the entire network using only your IP address and sometimes the login
data. So, what we need here is the good cryptography in case of information exchange channel that
should support us in remaining safe in terms of the communications requirements. Also, we should
mention that the web protocols are so very well-developed communications lines that would deal with the
queries and accept to transfer the internet signal from one point to another. In other words, the
communications protocol is only the set of rules that should get followed and if you cope like so; you
would obtain the internet traffic between your network’s devices.

Free download pdf