Page 27 - CDM-Cyber-Warnings-January-2014
P. 27
intellectual property. Any piece left unprotected could lead to a significant data security breach. Protecting business data requires an adaptive, built-in method of data security. IT sector has evolved a new approach known as Enterprise Data Protection (EDP). EDP is an always-on, data- state-independent approach to maintaining data security. It embeds data protection with the actual data and works to identify data at risk. 4. Blocking Transmission Control Protocol Transmission Control Protocol (TCP) and Internet Protocol (IP) are two of the best known members of the Internet protocol suite. The Internet protocol suite provides the protocols that enable all of the networks of the web to communicate. Every computer on the Internet supports TCP/IP. The protocols in the TCP/IP suite are layered protocols. Layered protocol suites separate duties between individual protocols in the group. IP is the heart of the Internet protocol suite. IP addresses are globally unique. It is a 32-bit numbers assigned by the Network Information Center. Internet routers use these IP addresses to deliver IP packets to their destination. TCP is a connection- oriented transport protocol that sends data as an unstructured stream of bytes. Blocking TCP provides a good cyber protection. 5. Using Passwords Passwords are the most common way to prove an identity when using websites, email accounts and a computer itself. The use of strong passwords is essential in order to protect user's security and identity. The best security in the world is useless if a malicious person has a legitimate user name and password. On secure sites they may also be used. In some cases a user will also be asked to enter only certain characters of the password, for extra security. 6. Patching Software In computing, a patch is a piece of software designed to fix problems or update a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. Poorly designed patches can sometimes introduce new problems. In some special cases updates may break the functionality. This routine is crucially important for reliable cyber security. 7. Information Protection Policy Information is a major asset in cyber system that should be protected. Protecting information is not simply limited to covering the stocks of information that the system maintains. It also addresses the people that use them, the processes they follow and the physical computer equipment used to access them. This Information Protection Policy addresses all these areas to ensure that high confidentiality, quality and availability standards of information are maintained. If all these requirements are not fulfilled, cyber system will not obtain its security. Conclusion In total, this article provides some examples and recommendations regarding the best practice in cyber security. Only if all segment of security are fulfilled, computer system and computer network can be assumed as cyber safe. Moreover, there is no absolute security or protection. There is only a process of maintaining an acceptable level of risk. About The Author Milica Djekic is an Online Marketing Coordinator at Dejan SEO, currently based in Novi Sad, Serbia. She received a Master of Science degree in Control Engineering from Faculty of Mechanical Engineering, University of Belgrade, Serbia in 2006. Her fields of interests are control systems, wireless technologies, cyber security, cryptography, speed enforcement systems, etc. At her spare time, Milica enjoys reading, researching and writing. + % %! ! & , ! . !( %+ ' "! "#+% ' - + % !& , ! % '& % & %) *"% *