In a connected world, cybersecurity becomes key to our daily lives. Knowing both the threats to which we are exposed and the protocols, programmes or habits that can protect us from them is essential. To avoid any risk and be forewarned of possible attacks, here are the concepts related to the world of cybersecurity that are being most used by experts in the field. Against threats...
Vulnerability. All failures or deficiencies that cause an unauthorised user to gain access to a set of data within a system or programme.
Social engineering. Techniques that persuade users by exploiting their goodwill and lack of concern. Social engineering techniques are used to obtain sensitive data such as passwords or codes.
Data leakage. Deliberate or inadvertent loss of confidentiality of information of companies or individuals that should, in theory, be private and that has ended up being visible or accessible to users.
Ransomware. A type of malware that prevents access to system files that have been tied up. The cybercriminal encrypts them, making them inaccessible to the user unless the user has the decryption password.
Phishing. A scam that is carried out by different means and in which the identity of a trusted person or company is impersonated in order to obtain sensitive user data (passwords, credit card numbers, etc.).
Exploit. A program designed to exploit a vulnerability in a system or program. The use of this type of program has three purposes: accessing a system illegitimately; obtaining administrative permissions on an already accessed system; or a denial of service attack on a system.
Zero - day. Vulnerabilities that are known to a small group of people and are not known or notified to manufacturers and users. They are very dangerous as the cyber attacker can exploit them without the user being aware of the vulnerability.
Attack vector. Method or mechanism by which cybercriminals, depending on the vulnerability detected, gain access to the "flawed" system.
Worm. Malware that is characterised by its speed in "contaminating" a system.
Zombie. Name given to computers that are remotely controlled by a cybercriminal.
Faced with the possible vulnerabilities that our company may present, we follow the recommendations of INCIBE, which proposes that the company should try to work under three principles that protect information: integrity, availability and confidentiality. These three concepts should be proportional to the criticality of the information handled at any given time. Thus, the more important this is, the more important the measures implemented should also be, taking into account the possible threats to which our system is exposed.
The demand for cybersecurity professionals is growing at an unprecedented rate. If you want to know which professions and specialisations in cybersecurity and what each one does, here we tell you about them. If you have it clear and your goal is to become a solid expert in the field, at IMMUNE we give you the tools you need to get to the right place. master's degree in cybersecurity in Madrid and as a online master's degree in cybersecurity.