Other contributions on the topic:

Prof. Dr. Dr. h.c. Stephan Hobe

on Cybersecurity

The practise to protect critical systems and infrastructure from digital attacks is called cyber security. In other words one understands under cyber security the practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. In the computerized world of today, working in cyber space is critical. In order to preserve computers and other critical infrastructure from respective attacks various types of cyber security may include the prevention of data, codes and business critical software, as well as the protection of physical digital data from authorized access and manipulation. Through this it can be ensured that the structures and facilities are access controlled and guarded against physical harm. It shall equally be guaranteed the securing of internal networks against unauthorized access. Types of cyber threats can include hacking, phishing, spoofing, spamming and the inclusion of malware i,e. malicious software which is intended to cause damage to systems.  Examples of this malware are viruses or worms as well as trojans. Ransomware as another form of malware can today make attackers to exfiltrate copies of the victims’ data and threatening to release them publicly if their demands are not met. Phishing is a common attack technique in which attackers use descriptive communications like for example E-mails or SMS to impersonate a trustworthy person or organization. In view of these, multiform cyber threats, the importance of cyber security for governments as well as for private and public enterprises is tantamount. It is concerned with defending network systems and applications against these threats. Different from data protection cyber security tries to protect the systems that make it possible to generate data management and to transfer data.

Cyber protecting clouds may enable service providers to deliver respective protection by for example integrating backup with the next generation artificial intelligence, to provide anti-malware and protection management as well as to protect through various sorts of backups.

Since modern conflicts are such as to gain access to data, presumed attackers may constantly come up with innovations of means for cyberattacks. Therefore, also in the area of cyber security the constant updating of the used technology and techniques is absolutely necessary.


Other contributions on the topic: