TRENDS CHANGING CYBER SECURITY

Margik Bhatt
Cyversity
Published in
4 min readFeb 9, 2021

In this article we will be briefly know about things which are affecting the current security protocols and which leads to the coerce towards changes.

Cyber ​​Security plays a key role in the field of information technology .Getting information has become one of the biggest challenges of today. When we always think about cyber security the first thing that comes to our mind is the increasing number of cyber crimes every day. Various governments and companies are taking steps to curb cybercrime. Despite the various measures, cyber security is still a major concern for many. This paper mainly focuses on the trends changing the face of cyber security.

1. Web servers:

The threat of attack on web applications to extract data or distribute malicious code continues. Cyber ​​criminals spread their malicious code through legitimate web servers. But data theft, much of which has received media attention, is also a major threat. Now, we need greater emphasis on protecting web servers and web applications. Web servers are an excellent base for these cyber criminals to steal information. One should therefore always use a more secure browser especially during important transactions so that they do not fall victim to these cases.

2. Cloud computing and its services

These days all small, medium and large companies are slowly adopting cloud services. In other words, the world slowly moves toward the clouds. This latest trend poses a major challenge to cyber security, as traffic can revolve around traditional testing points. Additionally, as the number of applications available in the cloud grows, the policy controls of web applications and cloud services will also need to change to prevent the loss of important information. Although cloud services are improving their models, there are still many problems with their security. The cloud can provide great opportunities but it should always be noted that as the cloud changes so its concerns are safe.

3. APT’s and targeted attacks

So what is APT?

APT stands for “Advanced Persistent Threat”.

APT is a long-term attack aimed at obtaining and using highly sensitive information. The hacker enters your computer network and spends a lot of time inside, monitoring movement, large users and details. Hackers work hard to stay undetected and can use sophisticated tools to do just that.

This attack is not random. The hackers carefully research and target the victims. These victims often include large corporations or governments that deal with highly confidential information, such as military programs, financial information, or patents.

How does this trend affect Cyber Security?

APT (Advanced Persistent Threat) is a whole new level of cyber ware. For years network security skills such as web filtering or IPS have played an important role in identifying such targeted attacks (especially after initial compromises). As attackers grow stronger and use more sophisticated tactics, network security must be combined with other security services to detect attacks. So one has to improve our security strategies to prevent further threats in the future.

4. Mobile Networks

Today we are able to connect with anyone in any part of the world. But for these mobile networks , security is much bigger concern. These days firewalls and other security measures are becoming porous as people are using devices like tablets, phones, PCs etc. all of this requires additional security apart from those present in the applications used. We should always consider the security issues of these mobile networks. Further, Most mobile networks are prone to cyber crimes because of which more care should be taken since there are security issues.

5. IPv6: New internet protocol

IPv6 is a new Internet protocol that replaces IPv4 (older version), which has been the backbone of our global networks and the Internet at large. Protecting IPv6 is not just a question of enabling IPv4. While IPv6 is a wholesale replacement in making more IP addresses available, there are some very fundamental changes to the protocol which need to be considered in security policy. Hence it is always better to switch to IPv6 as soon as possible in order to reduce the risks regarding cyber crime.

6. Encryption of the code

Encryption is the process of encrypting messages (or details) in such a way that listeners or hackers can read them. This is usually done using the encryption key, which specifies how the message should be encrypted. Encryption at first level protects data privacy and its integrity. But excessive use of encryption poses many challenges to cyber security. Encryption is used to protect data on the go, for example data transmitted over networks (e.g. Internet, e-commerce), mobile phones, wireless microphones, wireless intercoms etc. of information.

That’s all for now folks!! I will be back with more articles in the coming weeks. Till then Happy Learning :).

--

--

Margik Bhatt
Cyversity

Entrepreneur |Cyber Security enthusiast| "Stalling" around "Exploring"