{"id":6341,"date":"2024-11-15T14:31:41","date_gmt":"2024-11-15T07:31:41","guid":{"rendered":"https:\/\/binus.ac.id\/bekasi\/?p=6341"},"modified":"2024-11-15T14:31:41","modified_gmt":"2024-11-15T07:31:41","slug":"cybersecurity-essentials-addressing-cyber-threats-and-protection-in-modern-digital-spaces","status":"publish","type":"post","link":"https:\/\/beta.binus.ac.id\/bekasi\/2024\/11\/15\/cybersecurity-essentials-addressing-cyber-threats-and-protection-in-modern-digital-spaces\/","title":{"rendered":"Cybersecurity Essentials: Addressing Cyber Threats and Protection in Modern Digital Spaces"},"content":{"rendered":"<figure id=\"attachment_6342\" aria-describedby=\"figcaption_attachment_6342\" class=\"wp-caption clear aligncenter\" itemscope itemtype=\"http:\/\/schema.org\/ImageObject\" style=\"width: 640px\"><img loading=\"lazy\" decoding=\"async\" itemprop=\"contentURL\" class=\"wp-image-6342 size-medium\" src=\"http:\/\/binus.ac.id\/bekasi\/wp-content\/uploads\/2024\/11\/6838622_363-640x453.jpg\" alt=\"\" width=\"640\" height=\"453\" \/><figcaption id=\"figcaption_attachment_6342\" class=\"wp-caption-text\" itemprop=\"description\"><a href=\"https:\/\/www.freepik.com\/free-vector\/online-safety-data-protection-secure-connection-internet-security-flat-isometric-concept_6838622.htm#fromView=search&amp;page=1&amp;position=1&amp;uuid=4df22343-d566-42d3-ade7-6b020cc4900f\">Image by sentavio on Freepik<\/a><\/figcaption><\/figure>\n<p><span style=\"font-weight: 400\">Because of the recent technological advancements, every aspect of our lives has been affected significantly (most of the time positively, but sometimes also negatively). One example of this is the way businesses conduct their operations have changed whether it is from the way they do their logistics or the way they market themselves, it is increasingly becoming more apparent that more and more of our lives is being carried out in the cyber space. Thus, my reasoning for the selection of the topic of cyber security is to raise awareness and to also deepen my knowledge about the dangers of ignorance in this technological era.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When talking about cyber security, we must start at cyber threats. Cyber threats include cyber warfare, cybercrime, cyber terrorism, and cyber espionage, etc. poses a threat not only to the government or specific corporations but also each and every individual with access to the internet. Almost all of our personal and other sensitive data is uploaded on the internet through one or more channels. This of course poses as a threat for everybody especially governments because the leak of sensitive data or illegal access to the government\u2019s cyber space may lead to severe consequences such as economical damage, disruption of the air traffic control system, etc. But so far, it is hard to come up with a definitive and comprehensive definition of the term \u201ccyber-attack\u201d because of the complex and diverse dimensions that the term encompasses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cyber attacks fall into a broader context than what is traditionally called information operations which is the integrated use of the main capabilities of electronic warfare, psychological, computer network, military trickery and security operations in coordination with special support and relevant abilities and to penetration, stop, destroy or hijack human decisions.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Relevant fundamentals to cyber security:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400\">Information operations also include computer network operation which consists of the attack, the defense, and utilization enabling which can be summarized as the process of collecting and analyzing data which may serve as a precursor for the attack. Enabling operations in a computer network exploitation context can be carried out with the intent of stealing data<\/span><\/li>\n<li><span style=\"font-weight: 400\">Consequences of cyber warfare include catastrophic damage to the country\u2019s image at the international level, catastrophic damage to the political and economic relations of the country, extensive human casualties or danger to public health and safety, Internal chaos, and many more.<\/span><\/li>\n<li><span style=\"font-weight: 400\">Encryption is a tool for encrypting data with a key that is required to decrypt said data. This can be used as an attack strategy. This system of data encryption strategy is called the encryption system.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This is a visual representation (venn diagram) of some common terms in discussing cyber threat.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-6343 aligncenter\" src=\"http:\/\/binus.ac.id\/bekasi\/wp-content\/uploads\/2024\/11\/A1-1-640x388.png\" alt=\"\" width=\"473\" height=\"287\" \/><\/p>\n<p><span style=\"font-weight: 400\">There have been many attempts from experts in the field for giving a definition for cyber attack such as from Richard Clark which describes cyber-attacks as \u201cactions taken by countries to infiltrate the computers or computer networks of a country or other countries to cause damage or disruption\u201d. This is a flawed definition because it does not distinguish between the forms of disruption, and like Richard Clarks\u2019s definition, other experts\u2019 definitions are also flawed in one way or another.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0Next is cyber security. The increasing threat of cyber attacks leads to a defensive stance to protect private and customer data against a competitor taken by organizations and governments. Cyber-security includes practical measures to protect information, networks and data against internal or external threats. Cyber-security professionals protect networks, servers, intranets, and computer systems. Cyber-security ensures that only authorized individuals have access to that information (Ahmed Jamal et al., 2021). Cyber security itself is a broad term which includes several different types such as operational security, cloud security, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In the cyber-security topic, there is a \u201cpolicy\u201d for cyber security which is not well defined but it is a very common and well accepted concept. This concept is usually applied to the relevant areas of the regulator. The content of the security policy is determined by the objectives of the relevant regulatory body. Therefore, the policies of national and corporate cyber security are very different.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In conclusion, the cyberspace and its characteristics such as anonymity, vulnerability, and asymmetry need to be met with a certain level of caution. Security is no longer as clear cut as it was where enemies of the state for example can be identified geographically. All organizations and governments need to accommodate these changes and be prepared for the threats they may pose.<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Case example of cybersecurity:<\/span><\/p>\n<p><a href=\"https:\/\/m.economictimes.com\/news\/india\/kaspersky-says-blocked-over-74-million-local-threats-in-india-last-year\/articleshow\/107849398.cms\"><span style=\"font-weight: 400\">https:\/\/m.economictimes.com\/news\/india\/kaspersky-says-blocked-over-74-million-local-threats-in-india-last-year\/articleshow\/107849398.cms<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400\">In this news article, it is said that Kaspersky (which is a cybersecurity company which specializes in antivirus, internet security, password management, endpoint security, and other cybersecurity products and services) blocked more than 74 million local threats in India in 2023 alone. This highlights the severity of the threat we are facing in the cyber space.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Because of the recent technological advancements, every aspect of our lives has been affected significantly (most of the time positively, but sometimes also negatively). One example of this is the way businesses conduct their operations have changed whether it is from the way they do their logistics or the way they market themselves, it is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6342,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-6341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management"],"_links":{"self":[{"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/posts\/6341"}],"collection":[{"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/comments?post=6341"}],"version-history":[{"count":0,"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/posts\/6341\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/media\/6342"}],"wp:attachment":[{"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/media?parent=6341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/categories?post=6341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.binus.ac.id\/bekasi\/wp-json\/wp\/v2\/tags?post=6341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}