We use the latest technologies to provide the best experience!
Please download a newer version of your browser. Click to close
The functional cookies are always enabled because they ensure that you can use the basic functionality of our website. This way they remember the choices you make so that your experience on our website is better. In addition, they help with security issues and in meeting legal requirements.
These are cookies that are used to maintain your personal profile. For example, these cookies help us to send advertising to you only.
A brief introduction to Cyber Security and the most common threats people & organizations face daily.
Teacher @ Codaisseur
30 September 2020
If you follow Codaisseur on social media, you probably already know that we’re launching something new and exciting: the Cyber Security Bootcamp, a 6-monthpart-time (evening classes) course starting in JanuaryBut what exactly is Cyber Security?, you might be wondering. In this article, I'll try to answer some basic questions about it and explain why it's so important nowadays.As a broad definition, we can say Cyber Security is the practice that defends computers, servers, mobile phones, electronic systems, networks, and data against attacks.Why do we need Cyber Security? The dangers and losses (money, jobs, relationships and beyond) of poor online security have intensified the debates about Cyber Security all over the world, as more and more companies, industries, and governments use connected digital systems, which means they can at any time become targetsto cyber attacksTo understand how it works and why we need cyber security, let's think for a bit about what can happen if a network is breached
Partial or total loss of data
Confidential data theft: passwords, personal id's, bank data etc
Blackmail to get sensitive information back
Manipulation of company data
Cyber Threat Categories
Cybercrime a person or a group of people targeting systems for financial gain or to cause disruption;
Cyberattack often involves politically motivated data theft;
Cyber terrorism intended to undermine electronic systems in order to cause panic or fear.
What are the most common Cyber threats? How do cybercrime, cyber attacks, and cyber terrorism work? How do the attackers get control of computer systems?There are quite a few ways of doing that, but here are some of the most common ones:
DDoS (distributed denial-of-service) an attack where cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming the networks and servers with traffic. This renders the system unusable, preventing an organization from carrying out vital functions.
Malware a piece of software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer; known examples are viruses, trojans, spyware.
SQL injection cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a database via a malicious SQL statement. This gives them access to the sensitive information contained in the database.
Phishing cybercriminals target potential victims with emails that appear to be from legitimate senders (banks are often used here) asking for sensitive information. Phishing attacks are used to dupe people into handing over credit card data and other personal information.
(Wo)Man in the middle attack a cybercriminal intercepts communication between two parties in order to steal data. On an insecure WiFi network, for example, an attacker could intercept data being passed from one or more devices to the network.
A career in Cyber Security Now that you know a bit more about it, do you think a career in Cyber Security ould be your next professional step? The Cyber Security industry has grown more than 30 times in the last 10 years and is expected to keep growing exponentiallyin the future.And not only that, but the shortage of Cyber Security professionals is now estimated at nearly3 millionaround the worldSo if you feel like this could be a (new) career path for you, sign up for our free open evening event and take the first steps.