Hey guys, I hope you had a wonderful Christmas and a Happy New Year with your loved ones wherever you are in the world.
I thought before cracking down into challenges, it would be great to have a brief explanation of the situation and landscape where cybercrime can exist. This will be beneficial to readers that want to understand and maybe begin their career within Cyber Security.
My explanations may not be the best at the beginning, but I believe that through time and practice, I’ll become more and more proficient in my writing skills. I hope you enjoy what I have to offer and hopefully learn some new concepts and skills along the way.
Knowledge
What Can Be Hacked
As this generation is constantly generating and creating new devices, it is very difficult to keep up with security. Devices could include but not limited to:
- PCs, Laptops, Servers
- Tablets, Smartphones
- Printers, Scanners
- Autonomous Vehicles
- Gaming devices (Xbox, PlayStation)
- Accessories (Wireless Earphones, Smart Watches, Car Keys, Drones)
- Water, Heating and Electrical Systems
- Home Electronics (Dishwashers, Microwaves, Washing Machines, Coffee Machines, Fridges, Smart TVs, Cameras, Smart Home System)
- Public Devices (CCTV, Door Access Systems, Scanners, Sensors, ATMs, Traffic Lights, Scanners, Lifts, Fire Alarm Systems, Toilets, Air Traffic Control Systems, Power Grids, Medical Devices)
As shown above, other than the first 2 dot points (PC, Laptops, Servers, Tablets and Smartphones). All the other devices are considered to be an IoT (Internet of Things) as they are connected wirelessly to a network and have the ability to transmit data. As more of these IoT devices are created; the world becomes more connected allowing computers to access more data which can be favorable to hackers. There is also potential that malicious actors can take advantage of IoT functionalities by changing or controlling devices to cause bodily harm.
Risks and Issues With IoT
- Functionality vs Security
- Choice of high risk, high reward functionalities or a safer/secure environment.
- Reduced Need for Human Interference and Deployment in Hardly Visited Places
- Less chance of diagnosis whether information is compromised.
- Limited Physical Security
- Easily lost or stolen as devices are generally small.
- Difficult to Update Devices
- New products will replace old devices and eventually becomes ignored.
- Mass Production of Devices
- Increase of devices means more people have access, thus more private information is stored.
Hacker Motivation
- Penetration Testing
- Curiosity, Bragging Rights, For Fun
- Steal Data, User Credentials, Credit Card Information
- Revenge, Blackmail, Impersonation
- Manipulation of Information/News
- Espionage (Spying)
- Damage/Control Systems, Software and Hardware
- Damage Competitor’s Image
- Human Error, Accidental Access
- Destroy Evidence
Cost of Data Breaches
- Lost Productivity
- Loss of Customers
- Loss of Intellectual Property
- Loss of Investor Confidence
- Loss of Finances
- Legal Expenditures
- Investigative Activities
- Regulatory Interventions
Types of Threats/Attacks
- Phishing
- Malware
- Denial of Service DOS/DDOS
- Brute Force Attacks
- Sniffing
- Man-in-the-Middle Attacks
- Visual Hacking
- Social Engineering
- Physical Theft and Loss
- Privilege Misuse
- Key Loggers
- SQL Injection
Protection Against Threats/Attacks
- Penetration Testing
- Anti-Malware Software
- Software Updates and Patches
- Harden Devices and Apps
- Firewalls
- Intrusion Detection/Prevention System (IDS/IPS)
- Security Information and Event Management (SIEM)
- Multi-factor Authentication
- Data Encryption
- Raise Awareness
- Layered Approach to Security
Conclusion
As technology is improving drastically, computing devices such as PCs, laptops, tablets and mobile phones are becoming more and more optimised. As is more difficult to compete with computing companies, more IoT devices are emerging to target niche markets to improve the quality of life in innovative ways. With the increase of these devices, data quantity would be increased along with the amount of vulnerabilities. With businesses implementing more devices to improve productivity, security is commonly ignored putting companies at risk. As more and more devices are connected, it allows computers to access more data through all the devices listed above. In essence has potential to track an individual’s or company’s full digital biological footprint.
As technology is more prevalent in our daily lives, it puts Cyber Security in high importance. Due to continuous advancements, professionals will require to be constantly updated within the landscape.