When we talk about cybersecurity or information security we refer to the sector focused on the protection of network infrastructure, not only at the enterprise level but also at the individual user level. Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks and data from attacks with negative intentions.
Nowadays, we are exposed to many types of threats that every day act in search of a vulnerable system or network. Information from the INE states that at the end of 2020 in Spain there were 31,980,000 regular internet users, that is, more than 85% of the population between 15 and 80 years old accesses the internet at least two or three times a week, in addition, according to state information extracted from the media, Spanish companies receive an average of 500 cyber-attacks a week with an average cost of 162,300€. This is a rather worrying fact as these attacks are becoming more frequent as time goes by.
Cybersecurity has become part of our daily lives and is within the reach of all of us. Understanding it does not require a great deal of knowledge, but rather an interest in knowing how to act and protect oneself against the different threats to which we are exposed when we use our devices and surf the Internet.
But not all cybersecurity is the same; cybersecurity threats can manifest themselves differently. There are three main threats facing cybersecurity:
o El dCybercrime is based on attacking systems for financial gain or disruption.
o Cyber-attacks are often associated with the objective of gathering information for political purposes.
o Cyberterrorism aims to weaken electronic systems to cause panic or fear.
But how do they gain control of computer systems?
These are some of the main methods used to threaten cybersecurity:
1. Malicious software
It refers to malicious software that a cybercriminal has created to disrupt or damage a user's computer. It is one of the most common cyber threats.
There are different types of malware, including the following:
- Virus: a program capable of reproducing itself, which embeds itself in a clean file and spreads throughout the computer system and infects files with malicious code.
- Trojans - a type of malware that masquerades as legitimate software. Cybercriminals trick users into loading Trojans onto their computers, where they cause damage or collect data.
- Spyware: a program that secretly records what a user does so that cybercriminals can make use of this information.
- Ransomware: malware that locks a user's files and data, threatening to delete them unless a ransom is paid.
- Adware: advertising software that can be used to spread malware.
- Botnets: networks of malware-infected computers that cybercriminals use to perform online tasks without the user's permission.
2. SQL code injection
A SQL (Structured Query Language) injection is used to take control and steal data from a database. Cybercriminals insert malicious code into a database using a malicious SQL statement. This gives them access to confidential information contained in the database.
3. E-mail phishing
This is when cybercriminals attack their victims via an email platform posing as a legitimate company requesting confidential information.
4. Man-in-the-middle attack.
A man-in-the-middle attack is a type of cyber threat in which a cybercriminal intercepts communication between two individuals to steal data.
5. Denial of service attack
It is based on making the system unusable and preventing an organization from performing vital functions by overloading networks and servers with traffic.
And how can companies and individuals protect themselves against cyber threats?