Logo Indocyber
Search Icon
ISO
ISO New

Result 0 items

Cyber Security: Data Protection in Digital Era

22 September 2023

Advancements in technology and increased internet usage have greatly facilitated human tasks. Efficiency and effectiveness in performing tasks have become primary goals.


These advancements have also affected economic and business activities today. Many companies and businesses are undergoing technological transformations to remain competitive with other companies.


However, this technological transformation has brought other considerations.


One of them is related to data protection and cybersecurity in various typologies and modes of criminal activities.


So, what should we do to ensure the security of our personal and sensitive data?


What is Cybersecurity and Data Protection?


Source: Freepik


The term cybersecurity is related to cybercrimes. 


According to the University of York in "An Introduction to Cyber Security and Data Protection," cybercrime is criminal activity using computer devices and internet connections. 


Cybersecurity, according to CISCO, involves practical steps to protect systems, networks, and programs from digital attacks.


Cybersecurity is broad because it encompasses various criminal activities that occur in the digital space. Data protection is one of the efforts within cybersecurity. Data protection is a method or set of rules to protect personal or corporate data from misuse.


Forms of Cyber Attacks


There are several forms of cyber threats, including software attacks, identity theft, sabotage, and information destruction.


These attacks can occur due to vulnerabilities or weaknesses in the security measures of the data. Here are some types of cyber threats or attacks:


  1. Malware


In practice, malware attacks occur through program code designed to attack systems for the attacker's benefit. 


Malware includes infection methods like viruses, worms, Trojans, and bots, as well as malware actions like adware, spyware, scareware, rootkits, and zombies.


  1. Phishing


Have you ever received an email asking you to click a link and provide personal data? This could be a phishing attempt. 


Phishing is an attack that sends a specific link and asks the target to click and enter personal information.


  1. Man-in-the-middle attack (MitM)


This attack is known as eavesdropping because the attacker intercepts transactions between two parties. When the attacker can interfere and manipulate traffic, they can filter and steal data.


  1. Denial-of-service attack (DDoS)


This attack disrupts resources and bandwidth by flooding systems, servers, or networks. 

This disruption prevents the system from responding to legitimate requests, allowing the attacker to carry out the attack.


  1. SQL injection


This attack occurs when malicious code is injected into a server using Structured Query Language (SQL), forcing the server to reveal some information.


Types of Vulnerable Data


Cyber attackers target personal or sensitive user data, such as:


  •  Business financial details
  • Customer financial details
  • Customer or staff personal information
  • Intellectual property


Protect Your Personal Data


Source: Freepik


There are preventive measures you can take to protect your personal data, primarily by securing your computer devices. Here are some steps you can take:


  • Avoid using a single password for multiple applications or websites. Use random combinations when creating passwords.
  • Update your devices when necessary. Using the latest systems can make it difficult for attackers to find vulnerabilities for digital attacks on your computer.
  • Set your social media accounts to private mode.
  • Use an encrypted Virtual Private Network (VPN).
  • Download antivirus software on your computer. Antivirus software blocks unwanted files from entering your computer.


Sumber:


https://online.york.ac.uk/resources/introduction-to-cyber-security-data-protection/#cybersecurity


https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html#~types-of-cyber-attacks


Indocyber

INDOCYBER GLOBAL TEKNOLOGI

An integrated information & technology system provider, dedicated to delivering highly effective solutions in the field of Information Systems.

FOLLOW US

CONTACT US

  • email icon
  • phone icon
Copyright © 2026 by PT Indocyber Global Teknologi