Page 161 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 161

However, for every positive benefit provided comes threats. The addition of complexity comes issues
            with  security,  with  “ease-of-use”  as  the  central  focus  for  many  web  developers;  privacy  is  also
            compromised as a result. Big Data is all the rage for the past 5 years, with the world created more data

            for  the  last  10  years  than  all  the  previous  years  combined  since  the  dawn  of  the  IBM  PC  in  1981.
            Personally identifiable information has a smell of money for the cybercriminals. The more information
            they can extract, by hook or by crook, the bigger potential profits they can earn at the expense of users
            dependent on the system. Data loss prevention is an important aspect of computing that many have
            forgotten  about,  given  that  the  growth  of  the  Internet  gave  us  the  convenience,  being  in  a  state  of
            confidence,  people  tend  not  to  think  about  data  loss  possibilities,  let  alone  implement  a  Data  loss

            prevention strategy.


            Given that the actual performance of storage systems is much worse than required, and that even if it
            improves we still won’t be sure that a system will meet its requirements, the fourth part asks what is to
            be done. As with paper, content in digital archives will inevitably suffer loss and damage. That is why the

            world is very much addicted to online storage, and the market has responded. The cloud-storage solution
            brands have blossomed in the last 5 years, even the smartphone people hold today has automatic cloud
            backup as soon as it gets its first taste of online connection, creating a virtual data loss prevention system
            from the factory. The dependence with storing information in a remote server on the Internet is, however,
            the loss of control on our part when it comes to the availability, security, and integrity of data.



            We are in a multiplatform world, with various devices talking with the rest of the world through TCP/IP, a
            protocol designed in the 1970’s. With the purpose of packet switching to maintain connection and that
            connection  today  stays-on  24/7.  With  our  smart  devices,  we  are  fast  becoming  an  always  online
            civilization,  where  any  information  we  need  we  can  get  in  seconds,  and  literally  information  at  our
            fingertips “pitch” of Bill Gates from the late 90’s. Accessibility is the key why users became trusting of

            their devices, their service providers and their data being entrusted to 3rd parties. Such rich data attracts
            the attention of cybercriminals, which brought us a lot of trouble like phishing, virus infections, record/data
            loss, security breaches, and identity theft cases.


            Data loss prevention can be done weeks ahead of any possible data breaches or breakdown of hardware;

            this is having a credible backup plan. The principle of 3-2-1 backup strategy, applicable for both individual
            users and organizations. 3 - means three different media needs to be used, this diversified the backup
            storage minimizing the negative effects of the possibility of media corruption. One such example is an
            external hard drive, a USB flash drive and an online storage as backup methods for data stored on a
            laptop hard drive. 2 means two locations, a backup or multiple backups of critical data is useless if all of
            them are located in the same place. In the case of a fire, flood, earthquakes or any similar emergency





                                 161
   156   157   158   159   160   161   162   163   164   165   166