Cybersecurity has become essential for everyone, be it you or your organization.
You have almost reached the end of the first section – just a few steps left! We’ve now taken the first look at the corner stones of cyber security, and later on, you’ll get to implement your newly gained knowledge into action.
Cyber security has slowly transformed from a largely ignored topic into something essential for every internet user. Cyber security matters – in both business and pleasure – while concerning all levels of society.
Without proper security measures, your private data may be compromised. Adopting these few simple tips will help to keep you and your information safe:
The theory and idea of malware were theorised about long before the first viruses were developed. John von Neumann started to write papers and giving lectures on the self-replicating computer programs in 1949, and the first computer was completed in 1945.
At first, cyber security wasn't a huge concern as computers were rare and only accessible to few. Computer scientists could test out viruses in controlled networks, so the viruses didn't spread out into the wild. As computers became more available, people began to learn more about technology and computers' weaknesses.
At first creating viruses was more about entertainment and education before turning into something significantly more sinister.
The end of the 1980s brought a change to malware's nature. People began to use them for more malicious reasons from financial gains to simply causing harm. Nowadays, in the 2020s, cyber attacks present a real threat to our very society.
At first, malware spread through disks as network-connection was rare. The disks would contain games or other software that then was shared with friends which, in turn, helped the malware spread. As Internet connections became more affordable, viruses took advantage of email, gaining access to contacts and spreading quicker than ever.
As we learned before, cyber attacks are being dealt with every day, and the most serious ones may even end up rippling our very society. We looked at some real-life examples from the recent years, like the Psychotherapy Center Vastaamo's case, in which tens of thousands of patient records were stolen with the attackers blackmailing the patients as well as the company.
Another case occurred in the American real estate company, First American, in 2019, when it was discovered that sensitive information was accessible simply by changing a digit in the URL address. Despite multiple warnings, the company ignored the problems, and over 885 million files were exposed and made available. Afterwards, the company had to face a class-action lawsuit.
Skilled cyber security professionals are in high demand, and the need for a workforce is growing all the time. Jobs are often very well paid, and advancing in the career is possible.
Contrary to common beliefs, you don’t need to be a programming expert in order to make it in the cyber security world, although such skills are often necessary. During the course, you’ll learn about a few real-life companies that have made cyber security the focus in all their actions. Maybe you too will find work in the field one day.
Answer the following questions.