Page 132 - Cyber Defense eMagazine October 2023
P. 132

Some additional cybersecurity details

            Through  this  practical  book’s  section  –  we  would  deal  with  the  IoT  assets  that  would  use  default
            passwords. Let us remind you – that would happen when we tried to explain how it’s easy to hack those
            thousand web assets being available through the Shodan’s crawler. Many web resources would offer a
            quite convenient explanation how hacking of any IT infrastructure works in practice. Also, we would use
            the information from some expert’s sources such as the BrightTALK’s platform.

            Similarly as researchers – the hackers would play with our new technology and every single day they
            would discover new and new advancements. We would warmly advise all people spending a lot of time
            on the web on a daily basis to try to think hard and figure out how these emerging technologies could get
            applied in protecting our assets and preventing any sort of a cybercrime. It’s well known that the modern
            threats would get dependable on these technological improvements, so it’s very significant to use such
            an environment in order to prevent anything bad happens.



            The concluding talk

            Finally, we would spend some time and effort trying to conclude this book’s chapter. The main thing that
            we would notice through this research is that it’s quite easy to threaten all – mechatronics and embedded
            systems as well as business assets. Through these case studies – we would see how it works in practice
            and how vulnerable our IT assets are. In conclusion, we would say that many times  – but the best
            prevention for those cases is to cope with the procedures, policies and new trends in order to remain
            updated about the current tendencies and actively learn how to protect your valuable data.



            About The Author

            Milica D. Djekic is an Independent Researcher from Subotica, the Republic of
            Serbia.  She  received  her  engineering  background  from  the  Faculty  of
            Mechanical Engineering, University of Belgrade. She writes for some domestic
            and overseas presses and she is also the author of the books “The Internet of
            Things:  Concept,  Applications  and  Security”  and  “The  Insider’s  Threats:
            Operational, Tactical and Strategic Perspective” being published in 2017 and
            2021  respectively  with  the  Lambert  Academic  Publishing.  Milica  is  also  a
            speaker with the BrightTALK expert’s channel. She is the member of an ASIS
            International  since  2017  and  contributor  to  the  Australian  Cyber  Security
            Magazine since 2018. Milica's research efforts are recognized with Computer
            Emergency Response Team for the European Union (CERT-EU), Censys Press, BU-CERT UK and
            EASA European Centre for Cybersecurity in Aviation (ECCSA). Her fields of interests are cyber defense,
            technology and business. Milica is a person with disability.









            Cyber Defense eMagazine – October 2023 Edition                                                                                                                                                                                                          132
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   127   128   129   130   131   132   133   134   135   136   137