Cyber Security: Data Protection in Digital Era
22 September 2023
Advancements in technology and increased internet usage have greatly facilitated human tasks. Efficiency and effectiveness in performing tasks have become primary goals.
These advancements have also affected economic and business activities today. Many companies and businesses are undergoing technological transformations to remain competitive with other companies.
However, this technological transformation has brought other considerations.
One of them is related to data protection and cybersecurity in various typologies and modes of criminal activities.
So, what should we do to ensure the security of our personal and sensitive data?
What is Cybersecurity and Data Protection?
Source: Freepik
The term cybersecurity is related to cybercrimes.
According to the University of York in "An Introduction to Cyber Security and Data Protection," cybercrime is criminal activity using computer devices and internet connections.
Cybersecurity, according to CISCO, involves practical steps to protect systems, networks, and programs from digital attacks.
Cybersecurity is broad because it encompasses various criminal activities that occur in the digital space. Data protection is one of the efforts within cybersecurity. Data protection is a method or set of rules to protect personal or corporate data from misuse.
Forms of Cyber Attacks
There are several forms of cyber threats, including software attacks, identity theft, sabotage, and information destruction.
These attacks can occur due to vulnerabilities or weaknesses in the security measures of the data. Here are some types of cyber threats or attacks:
- Malware
In practice, malware attacks occur through program code designed to attack systems for the attacker's benefit.
Malware includes infection methods like viruses, worms, Trojans, and bots, as well as malware actions like adware, spyware, scareware, rootkits, and zombies.
- Phishing
Have you ever received an email asking you to click a link and provide personal data? This could be a phishing attempt.
Phishing is an attack that sends a specific link and asks the target to click and enter personal information.
- Man-in-the-middle attack (MitM)
This attack is known as eavesdropping because the attacker intercepts transactions between two parties. When the attacker can interfere and manipulate traffic, they can filter and steal data.
- Denial-of-service attack (DDoS)
This attack disrupts resources and bandwidth by flooding systems, servers, or networks.
This disruption prevents the system from responding to legitimate requests, allowing the attacker to carry out the attack.
- SQL injection
This attack occurs when malicious code is injected into a server using Structured Query Language (SQL), forcing the server to reveal some information.
Types of Vulnerable Data
Cyber attackers target personal or sensitive user data, such as:
- Business financial details
- Customer financial details
- Customer or staff personal information
- Intellectual property
Protect Your Personal Data
Source: Freepik
There are preventive measures you can take to protect your personal data, primarily by securing your computer devices. Here are some steps you can take:
- Avoid using a single password for multiple applications or websites. Use random combinations when creating passwords.
- Update your devices when necessary. Using the latest systems can make it difficult for attackers to find vulnerabilities for digital attacks on your computer.
- Set your social media accounts to private mode.
- Use an encrypted Virtual Private Network (VPN).
- Download antivirus software on your computer. Antivirus software blocks unwanted files from entering your computer.
Sumber:
https://online.york.ac.uk/resources/introduction-to-cyber-security-data-protection/#cybersecurity
https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html#~types-of-cyber-attacks


