Cyber Defense Magazine – August 2019

(Nora) #1

How to protect your IT asset from the external incidents?


If your sensitive data are enclosed to your IT system and there are some restrictions about who can
handle them – it’s quite obvious that there would be the lower risk to the cyber attacks coming from the
outside. Maybe you would not prevent your machine from being breached, but you would definitely
protect your data from being stolen and misused which is the main point of this suggestion. Yet, the open
question is that you would not prevent your assets from being breached and you would only be able to
prevent your data from being stolen which could be the sword with the two edges for a reason the hackers
of the tomorrow could choose to damage or even destroy your critical data certainly causing their loss.
The black market actors would rather select to steal anything they can steal and so many cyber espionage
groups would give up once they get they cannot take anything from your machine. On the other hand,
anyone being malicious within the cyberspace would be satisfied with the data and operating system
demolition for a reason they would believe that’s the way to defeat their opponent or at least get paid.


The role of remote assistance permissions


If anyone would like to access your machine remotely – he should need the permission for such an
intervention. In other words, the IT systems of the future should cope with some bans about who can
make a breach to your infrastructure decreasing the chance to the attackers to do the complete data loss.
Also, it’s quite clear that so many cybercrime groups could get in possession of the professional tools or
there could be some state-sponsored hackers who could apply such software to overplay our suggestion.
Anyhow, the good data loss prevention strategy could be from the crucial significance for the cyber
security of the tomorrow.


Some future perspectives


The good point of this discussion is that there are some ideas how to prevent the data loss at some level
and in order to fully protect our cyber assets – we should think a bit about the combination of the cyber
defense tactics and countermeasures that would help us to manage the risk intelligently. Any cyber
breach could get discovered using the intrusion detection and prevention techniques and if there are
some well-developed incident response strategies – the chances to your enemies to cause you the harm
could be far more decreased. The final imperative to this suggestion would be to progress with the higher
and higher levels of protection that could offer us an opportunity to prevent some variations of the data
losses and possibly the cyber breaches opening an option to make much smarter and more secure
surroundings to our end users. Finally, we are fully aware that the human beings would rather choose to
get the machines serving to them and relying on the expert’s knowledge in resolving any inconvenient
situation on, but at this stage that is still so far away. The technological solutions got no brain and they
can do only what we want them to do, so as we are looking for the theory of everything in the physics
and the fact is we are still satisfied with the small pieces of the science – we should know that the
comprehensive solution in the cyber defense is still the distant future project and there are a countless
number of small steps we need to take in order to get there.

Free download pdf