Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity & System Protection Analysis - Coggle Diagram
Cybersecurity & System Protection Analysis
Hacking
Hacking is an attempt to exploit a computer system or a private network inside a computer
Hackers
Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. They access the information you don't want them to have.
Types of hackers
Black hat
Black hat hackers are normally responsible for creating malware, which is frequently used to infiltrate computerized networks and systems.
White hat
White hat hackers are often employed or contracted by companies and governmental entities, working as security specialists looking for vulnerabilities. While they employ the same methods as black hat hackers, they always have permission from the system’s owner, making their actions completely legal.
Grey hat
Grey hat hackers usually seek out vulnerabilities in a system without an owner’s permission or knowledge. While they’ll report any issues they encounter to the owner, they’ll also request some sort of compensation or incentive.
Connection
Global Context
Global context: Scientific and Technical Innovation
When hacking first started, it was not serious in society's eyes. The hackers were not even known as hackers but as practical jokers. The very first hack came in 1878 when the phone company, Bell Telephone, was started. A group of teenage boys, hired to run the switchboards, would disconnect or misdirect calls.
The first security hacking incident was Magician and inventor Nevil Maskelyne, who disrupted John Ambrose Fleming's public demonstration of Guglielmo Marconi's secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium's projector.
Cybersecurity proper began in 1972. Researcher Bob Thomas created a computer program called Creeper that could move across ARPANET’s network, leaving a breadcrumb trail wherever it went. It read: ‘I’m the creeper, catch me if you can’. Ray Tomlinson – the inventor of email – wrote the program Reaper, which chased and deleted Creeper. Reaper was not only the very first example of antivirus software, but it was also the first self-replicating program, making it the first-ever computer worm.
Exploration
Opportunity
Hacking helps create Cybersecurity jobs, which benefits the economy and can decrease unemployment.
Risk
When hackers operate a cyberhacking, it puts the company's sensitive data in danger, and can affect the economy and information the company have.
Consequence
The consequences after a data breach, confidential information can be lost, damaged assets, disrupt company operation. The company loses time, money, and recources to recover.
Responsibility
The company needs to be responsible for the cybersecurity that the company use, and must know the pros and cons of the protection systems.
Key Concepts
Communication
Using messaging applications such as Instagram, Facebook, WhatsApp, etc. communication between such application can need cybersecurity verification and authentication to be able to communicate.
Related Concept
Collaboration
Using different types of cybersecurity for the company can decrease the risk for having data breach and unauthorized access to sensitive information.
Evaluation
After installing a cybersecurity software or test, there needs to be an evaluation to see if the software or test is trustable, convenient, and accurate.
The target audience
All clients that use IT and protection systems
Needs of Solution
Benefit to Target Audience
Safer Protection of data
Keeps hackers and cyber-thieves from accessing sensitive information
Avoids website from crashing
Save a large sum of money
Reduces insurances
Reduces compensation
Reduces liability
System that I am planning to implement in LockPower Sdn. Bhd.
Web Application Firewall
What it is: helps protect web applications by monitoring HTTP traffic between a web application and the Internet
Who uses it: companies in need to cybersecurity protection
How it works: When a firewall uses packet filtering, the packets attempting to enter the network are run against a group of filters. These filters remove the packets that match certain identified threats and allow the others through to their intended destination.
Why companies use this: VPNs can securely connect a user to a company's internal network or to the public Internet. Businesses typically use a VPN to give remote employees access to internal applications and data, or to create a single shared network between multiple office locations.
Where is it used: Firewalls are used on networks to provide security boundaries between our inside network devices and untrusted areas
Why people choose this security system then other systems: Firewalls provide protection against outside cyber attackers by shielding the computer or network from malicious or unnecessary network traffic.
VPN (Virtual Private Network)
Why companies use this: Firewalls look for and block viruses, worms, spam, and other unwanted Internet traffic. They will also log intrusion attempts as well as other violations to business policies. This enables you to examine unauthorized access attempts and other suspicious activity.
Who uses it: companies in need to cybersecurity protection
What it is: A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
How it works: a service that encrypts data and hides IP address by bouncing network activity through a secure chain to another server miles away
Where is it used: normal internet users and organizations. Organizations may use a VPN in order to make sure any outside users that access their data center are authorized
Why people choose this security system then other systems: obscures online identity, so people can browse the internet safely, securely and anonymously.
Audit
Why companies use this: Audit provides credibility to a set of financial statements and gives the shareholders confidence that the accounts are true and fair. It can also help to improve a company's internal controls and systems.
Who uses it: companies in need to cybersecurity protection
What it is: a record of changes made to a system
How it works: Audit examines business's financial records to verify they are accurate.
Where is it used: On softwares and websites
Why people choose this security system then other systems: Audits determine whether IT controls protect corporate assets, ensure data integrity and are aligned with the business's overall goals.