We are currently living in a technological age, so much so that all professions, businesses or companies are SMEs or macro-enterprises depend on it, including our personal life. In each house at least there is a smartphone, because this small computer has become essential for our daily work.Now, with these data, the question is how many people or companies apply standards, best practices or mechanisms to protect themselves from cyber criminals? First of all, we must understand that it is cybersecurity. Wow! It seems rhymbombing this word, the first that could come to mind when hearing about “cybersecurity”, would be the word “hackers”, people who in 30 seconds decipher passwords and provide certain digital services commonly criticized by society, perhaps we may have seen the famous “Anonymous”, in some video or in some news of conspiracies. If we look for images of hackers on the internet, we will only see hooded people who are not seen in the face or with the famous "Guy Fawkes" face, it seems that they would hide their face not to be chased by their digital intelligence activities. Well, I'm sorry to say it's not like that, in 30 seconds they don't hack a military facility, no less they have to wear hood.A basic definition for the purpose exposed in this article is: It is the set of procedures, tools and standards to prevent the attack, subtraction, alteration and mishandling of our data without our permission.We must understand that the definition of cybersecurity is of greater technical breadth than previously exposed, but as we mention it we take this to make your understanding easy. We analyze the first word, and this is that cybersecurity is a procedure, why? Well, a procedure is the action or intention to proceed with some particular question, this means to act properly, following predefined steps or guidelines to develop this activity effectively. For example, scientists perform various procedures to create medicine for the human being.At the Royal Spanish Academy, we can find the following procedure definition: “Action to proceed. Method of performing some things. Action by procedures”. In the digital context, we can identify a procedure as the steps to follow in a determined action, and in cybersecurity would be all those instructions or the launch of actions to prevent a breach of security, in a few words, would be the proper procedure that is carried out to solve a cyber problem. And with that, you resort to the use of the second word we have already named in the definition of cybersecurity, remember? These are the tools.When we talk that cybersecurity is the tools that are prepared to avoid cyber-attack (digital), we are referring to the use of instruments that can facilitate the execution of procedures for a common good, in this case it would be the proper protection in the network. For example, if we have a calculus exam, and the teacher allows us to use the calculator to develop the exercises, then we are using a tool. What are these tools we can use in cybersecurity? Are they very good? Are they easy to use? These questions would make us enter another field of cybersecurity, and this is about the existence of tools created to make our navigation safer on the network.The following word we may collect from the initial definition of cybersecurity is the norms. All human society is based on laws and rules for progress-oriented development, we can also find in institutions, companies and even at home. The norms are necessary and important, because it guides us to do actions according to morally accepted, do we have rules in our home? So we're using the rules. But why are the rules so important? Simply because they strengthen the behaviors and attitudes of individuals, their respective personal growth, and in the case of our children, it helps us to educate us in the best possible way, so that they are respectful and productive citizens. If we look for the RAE (siglas of the Royal Spanish Academy), we can find the following definition on the norm: “It is necessary to follow or to adjust the conducts, tasks, activities, etc.” Contextuing with cybersecurity, we can say that a standard is the pre-established rules to properly dispose of digital protection resources, giving us the fundamental basis to know our limits and the tools we have in our hands to deal with a threat. Have you ever realized that these three words relate to each other? The three form the essence of cybersecurity.Unfortunately, although cybersecurity is in charge of securing the conscious use of networks, and encompassing standards to keep an environment safe on the internet, there are malicious characters who every day try to break these safety standards, are like criminal viles that steal, but digital. Now we can have a trustworthy idea of what cybersecurity really is, however, we might not know the other four words that make up the definition of cybersecurity, are we talking about the “attack”, “sustration”, “alteration” and “manipulation”, in which are these terms? Let's see him.When we talk about a cyber attack or also known as cyberattack, we refer to the impetuous, recursive and negative action to do harm through a malicious computer system, where our device is affected by another, just as previously explained, behind all this are malicious characters and cyberdelinquents who take advantage of the ignorance of others. From an attack go out to flote several means to hurt us, and from here comes what we call the sustration, alteration and manipulation of our data. In the first instance, sutraction refers to taking personal and important information about an individual, this is done through suspicious forms, or a questionnaire sent by e-mail messages, this information can be changed, i.e., completely changed to a particular benefit, or to the creation of new data. The manipulation is very similar to the alteration, however, in this can be suppressed, erased, and use the attacker's desire that information, furthermore, also includes interference to a computer program, giving the loss of security and transparency of that system.To fully understand the execution of these four nefarious processes that can harm our interaction in the network, we will do so through the following illustration:Imagine that we are sitting on our favorite screen, we want to see a movie that interested us too much, fasten the computer and start looking in the search engine for the title of that tape, draw us attention to a web page, and load there, open the content and exits fastidious ads, we close each, until we finally begin to see the fascinating movie. Suddenly, a strange warning appears that we have won a sum of money juice (using messages like: “You’re our number 600 visitor, and you’ve earned $1,000,” “Enjoy, benefited by the Always Ghana lottery!”, attracts us that warning for its impressive colors, and we press the confirm button (this is the first step of a cyberattack). Then, that notice leads us to another page with a colored design, and we see a form that asks us all our data (sustration), there we access and fill out each empty bar, we could see in this form options to fill out: names, surnames, address, postal code, sex, birth date, and bank information. In our ignorance we fill everything and finish with the button to send, we sigh and we have the illusion that this money will reach us at a few hours.Meanwhile, the cyber-delinquent with a malicious smile receives the data we had sent, furthermore, of having accessed our system, since with a simple click we gave you permission to access our computer, revealing all the information we have kept on our devices, as well as the passwords. Then, the delinquent begins to change our data and all that we have aggregated as security (change), then ends up removing and removing (manipulation) each verification tool that we have assigned to our personal accounts, as well as our mobile number and security issues. Also, that individual evil can access our intimate files, then could send us emails threatening to publish those images if we do not pay a money or could manipulate photos and make them inappropriate, to resort to fraud. This type of case is very dangerous since it could harm the tranquility of any family, and even a tragedy could occur, this fact is called cybercrime.
11/15/2022 - technology-and-innovation
Cybersecurity without Tecnicisms
Do you want to validate this article?
By validating, you are certifying that the published information is correct, helping us fight against misinformation.
edwin vergara
Hi, I am Edwin Vergara, I perform as a Cybersecurity Specialist, conference and writer with 15 years of experience in the area of Information Technology that includes the Retail, Media, Construction and Health sectors. So far I have two published works, Cybersecurity for the Family and Digital Evidence and Custody Chain.
Total Views: 6
Comments