top of page

Frequently Asked Questions

WHAT IS CYBERSECURITY?

Cybersecurity refers to the specialization of computer network security that consists of technologies,

policies, and procedures that protect networked computer systems from unauthorized use or harm.

Broadly speaking, cybersecurity topics can be subdivided into two complementary areas:

​

Cyber-attacks: offensive and emphasize network penetration techniques.

​

Cyber defenses: protective and emphasize countermeasures intended to eliminate cyber-attacks.

​

Cyber-attacks can take aim at the enterprise, government, military, and other infrastructural assets of a nation or its citizens, where these assets can include physical infrastructure (e.g., power grids, nuclear reactors) as well as computational infrastructure (e.g., computers, networks). Cyber-attacks can be classified by their participating actors (states vs. non-states) and their attack mechanisms (e.g., direct attack, malware, exploits). 

​

Cyber defenses must protect the enterprise, government, military, and other infrastructural assets of a nation.

or its citizens. As is the case with cyber-attacks, cyber defenses can be classified by their participating actors (states vs. non-states) and their attack mechanisms (e.g., direct attack, malware, exploits).

 
WHY DO WE NEED CYBERSECURITY?

The increasing reliance of our information-age economies and governments on computer-based infrastructure makes them progressively more vulnerable to cyber-attacks on our computer systems, networks, and data.

In their most disruptive form, cyber-attacks target the enterprise, government, military, or other infrastructural assets of a nation or its citizens. Both the volume and sophistication of cyber threats (cyber warfare, cyber terrorism, cyber espionage and malicious hacking) are monotonically increasing, and pose potent threats to our enterprise, government, military, or other infrastructural assets. Knowing that to be forewarned is to be forearmed, we are well advised to effect strong Cybersecurity defenses that will thwart all cyber threats.

​

Recent newsworthy cyber-attacks on critical cyber infrastructure (e.g., Bitcoin hacker attacks, NSA data leaks and subsequent PRISM revelations) demonstrate the urgent need for improved cybersecurity. As cyber threats grow, so must our abilities to neutralize them. Towards that end, the U.S. government issued an Executive Order for Improving Critical Infrastructure Cybersecurity in February 2013, and the 2014 President's Budget devoted over $13B to cyber-related programs and activities [Federal Information Technology FY 2014 Budget Priorities, p. 15]. The European Union Agency for Network and Information Security (ENISA) lists all known public documents of National Cyber Security Strategies all across the world.

 
WHAT IS MALWARE?

Malware is an umbrella term derived from "malicious software", and refers to any software that is intrusive, disruptive, or destructive to computer systems and networks. Malware may take many forms (executable code, data files) and includes, but is not limited to, computer viruses, worms, trojan horses (trojans), bots (botnets), spyware (system monitors, adware, tracking cookies), rogue warfare (scareware, ransomware), and other malicious programs. The majority of active malware threats are usually worms or trojans rather than viruses.

 
WHAT IS CYBERSECURITY HYGIENE?

Cybersecurity hygiene is a colloquial term that refers to best practices and other activities that computer system administrators and users can undertake to improve their cybersecurity while engaging in common online activities, such as web browsing, emailing, texting, etc.

​

The best cyber hygiene practices for computer network/system administrators include, but are not limited to:

​

  • ensuring that routers and firewalls are installed and properly configured.

  • updating both authorized users & unauthorized users and enforcing compartmentalized user permissions.

  • ensuring that all anti-virus, spam ware, and other anti-malware protection software is properly installed.

  • updating all Operating System, application software, web browsers with the latest security patches.

  • enforcing strong password rules and 2-Factor/Multi-Factor Authorization (2FA/MFA) procedures.

  • ensuring that all computer networks are physically segmented with secure routers and active firewalls.

 

Cybersecurity hygiene related best practices for computer system users include, but are not limited to, using strong passwords and 2FA/MFA, avoiding accessing cybersecure systems on unauthorized and non-secure BYOD's (Bring Your Own Devices), and avoiding mixing personal with cybersecure email and work documents.

​

WHAT ARE SOME STEPS, CHILDREN AGES 2-12, SHOULD TAKE IN TERMS OF CYBERSECURITY?
​
​

​

This is your FAQ Answer. Make sure your writing is clear and concise. It’s a good idea to review what you’ve written and ask yourself the following - if this was my first time visiting the site, would I fully understand this answer? Then revise or expand as necessary. Consider adding a photo or video as a visual tool or for extra impact.

MY COMPANY IS STRUGGLING IN A CHANGING MARKETPLACE. CAN YOU HELP US STAY RELEVANT?

This is your FAQ Answer. Make sure your writing is clear and concise. It’s a good idea to review what you’ve written and ask yourself the following - if this was my first time visiting the site, would I fully understand this answer? Then revise or expand as necessary. Consider adding a photo or video as a visual tool or for extra impact.

bottom of page