24 The Counter Terrorist ~ August/September 2019
systems are all vulnerable.
For organizations, the issue
of defense from cyber attacks is
even more crucial because secure
infrastructure is necessary to keep
the organization running and able
to fulfill the unspoken promise of
trustworthiness to customers. When,
as individuals, we utilize hospital
services, we expect the hospital to
protect our medical records. The
expectations are even higher when it
comes to our financial records and
access to our bank accounts. In the
case of a cyber-attack, the law might
punish the attacker, but as individuals
we hold the organization that was
breached accountable. It is to them we
gave our trust and precious data; they
are responsible for its protection.
Note that the term does not define
the method of attaining unauthorized
use of electronic data.
THE CHALLENGE
In today’s connected world, cyber
defense is critical for both individuals
and organizations.
At an individual level, a cyber
attack can result in everything
from identity theft and extortion
to the loss of important data such
as research or family photos. We
all rely unthinkingly on critical
infrastructure such as power plants,
air-traffic control, hospitals, and
banks. As the Internet of Things
(IoT) grows, we are becoming
increasingly more connected, and
our homes, cars, and communication
METHODOLOGY
Just as there are different methods
of attaining unauthorized use of
electronic data, there are various
methods of securing data.
The method most often considered
is defensive software. Cyber security
software is designed to protect
against technological attacks such as
malware, ransomware, and phishing.
To provide good coverage, it is
necessary to protect the different
portals for these kinds of attacks:
computers, smart devices, routers,
networks, and the cloud.
Technology used to protect these
entities includes next-generation
firewalls, DNS filtering, malware
protection, antivirus software, and
email security solutions. In addition,
Staff Sgt. George Davis [Public domain]