CYBERSECURITY

1. FUTURE CYBER THREAT ASSESSMENT

The future of cybersecurity will be largely determined by what hackers will be after. This will primarily be in two areas: Health and Wealth. More specifically, this means private healthcare-related data and sensitive payment information. Private health records can be worth a fortune. Credit card data can be used for fraud or sold on the black market. Hackers will also take advantage of the fact that companies increasingly rely on their supply chains and will target popular third-party tools, suppliers and companies as a way to breach as many targets as possible. Risk assessments can be performed on any application, function, or process within your organization. But no organization can realistically perform a risk assessment on everything.

To defend against such cyberattacks, companies will need to use more effective security solutions with innovative approaches. For instance, companies will assess their cybersecurity as seen from the hacker’s point of view. The goal will be to not only increase cyber resilience internally within their specific company, but also across the company’s supply chain. Moreover, companies that leave their resources open on the internet and fail to implement strong authentication will be a target to opportunistic attacks. To effectively protect their key assets companies must increase the visibility of security at the board level and increase investment in security talent and technology.

2. CRYPTOGRAPHY

Cryptography is a scientific concept where complex logic and mathematical equations are used to generate robust encryption methods. To keep this information from falling into the wrong hands, they had to hide its meaning. This allowed them the benefit of surprise, timing, and concealed maneuver. The earliest forms of cryptography relied on codes, transposition, and substitution to conceal their messages.

3. SEMANTIC CYBERATTACKS

Semantic cyberattacks, also known as social engineering, manipulate human users’ perceptions and interpretations of computer-generated data in order to obtain valuable information (such as passwords, financial details, and classified government information) from the users through fraudulent means. Phishing is one of the most popular semantic attacks in which hackers send an email hoping to collect some information from the victim.

4. COMPUTER WORM

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage. Worms are often deployed as secret agents. They collect and report information about your network to the hackers. Worms can be transmitted via software vulnerabilities. Or computer worms could arrive as attachments in spam emails or instant messages (IMs). Once opened, these files could provide a link to a malicious website or automatically download the computer worm. Once it’s installed, the worm silently goes to work and infects the machine without the user’s knowledge.

5. TROJAN HORSE

A Trojan Horse on the other hand is something that looks harmless. Trojan horses can be sent using several methods, including hackers cloning an email. A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include: deleting data, blocking data, modifying data, copying data, disrupting the performance of computers or computer networks. Unlike computer viruses and worms, Trojans are not able to self-replicate.

6. WHISTLEBLOWER PROTECTION ACT 2010

According to Law of Malaysia Act 711 under Whistleblower Protection Act 2010, improper conduct means any conduct which if proved, constitutes a disciplinary offence or a criminal offence meanwhile disciplinary offence means any action or omission which constitutes a breach of discipline in a public body or private body as provided by law or in a code of conduct, a code of ethics or circulars or a contract of employment, as the case may be.

This act provides protection to whistleblowers who voluntarily come forward to report or reveal information on corruption activities. This Act also encourages the public from all sectors to disclose corruption related activities. The identity of the whistleblower and the information provided are kept confidential from any party. Whistleblowers are also given immunity from any civil, criminal or disciplinary action due to the revealing of the act of corruption.

A disclosure of improper conduct under subsection may also be made although the person making the disclosure is not able to identify a particular person to which the disclosure relates. Second, although the improper conduct has occurred before the commencement of this Act in respect of information acquired by him while he was an officer of a public body or an officer of a private body; or of any improper conduct of a person while that person was an officer of a public body or an officer of a private body.

Tiada ulasan:

Catat Ulasan

salam para penghuni Dunia KU..
sudi-sudikan lah membaca dan memberi komen..
jasa anda amat di hargai..

Dunia Iqmar Effendy

DISCLAIMER"INI ADALAH BLOG PERSONAL IQMAREFFENDY99BLOGSPOT[DOT]COM.SEMUA ENTRI DAN GAMBAR DI DALAMNYA ADALAH KISAH DAN MILIK DARI TUAN PUNYA BLOG SENDIRI. DI LARANG KERAS MENGAMBIL GAMBAR DI DALAM BLOG INI UNTUK TUJUAN APAPUN TANPA SEIZIN TUAN PUNYA BLOG. MAAF ATAS PENGGUNAAN GANTI NAMA 'AKU' UNTUK BLOGGER YANG LEBIH DEWASA. SEBARANG PERTANYAAN BOLEH HUBUNGI IQMAR EFFENDY."