posted in: News | 0

Cyber security is the practice of defending computers servers mobile devices electronic systems networks and data from malicious attacks. This post will introduce you to the basics of cyber security.

Who is responsible for security in the IT world?

There are no typical people who are responsible for the security of a system. Instead it has to be defined by the particular organization or organization and its security requirements. What are the unique security requirements of a business? Business is, usually, facing several threats from multiple directions and hence have to address different levels of security.

Cyber Security Awareness Month: Why MSMEs must step up digital efforts to  secure future growth - The Financial Express

There are many distinct security challenges faced by businesses today and accordingly, the business needs to decide how they want to tackle these challenges (as shown on websites like On the one hand they want to improve the efficiency of their business processes and, on the other hand, implement robust security measures. It is essential that the respective business needs and requirements are in alignment with each other. So, in order to provide the security necessary for business operations and security, there is a need for organizational structure in terms of assigning responsibility to those who are responsible for the security of a particular system or device.

The work of defining a security system is not the same as developing a technology. Technology allows the solution to be delivered in the shortest possible time as well as enhancing efficiency and value creation. It can be applied to systems and devices alike as its entire value is in how it operates. In order to deliver a security solution in a timely manner, security structure needs to be defined based on that specific use case and applied to systems and devices alike.

Defining a security system is very different from making the software to be used in systems. Security is a process and there are no simple steps in defining the security system. The way you define security requirement can vary from making the appropriate operational security audit, to having a formal defined system like a security control and data warehousing system, to a type of behavior, like pre-discovery of vulnerabilities and authentication by default.

A security analysis needs to take into consideration many things before delivering a solution. It should consider people who have access to the system or device, their capabilities and interests in terms of security and if any gaps exist in any system, have to be remedied. No one entity can be responsible for performing a security assessment for its own system or devices as it does not have the same requirements or scope.

The security architecture is defined by the people who have to run it on an integrated basis. For example, an IT team has to define the overall security architecture with various layers for each device or system. Each security risk is assessed by the appropriate security team. Once the final application and implementation of the system is complete, it is typically brought under an independent infrastructure that can also be inspected by independent teams for further health checks.

What is an attack vector?

Let’s step back for a moment and explain what an attack vector is and how it differs from the conventional definition of the security system. An attack vector is any circumstance or method that provides a way for a malicious actor to access or break into a system, possibly with the purpose of breaching its security. It may involve hardware, software or environment modification or manipulation.

For example, malicious attacks on network data will be dealt with by network engineering procedures that ensure all the critical systems have security locks on their network access. Software defects will be fixed with security updates. Malware can be found in this scenario and therefore, its nature can be regarded as an attack vector.

Leave a Reply

Your email address will not be published. Required fields are marked *