W8-9 Module 004 The Structure of The Cyberspace PDF
W8-9 Module 004 The Structure of The Cyberspace PDF
Lesson 4
The Structure of Cyber Space: The Internet Backbone and National Infrastructure
Cyber-Attacks Structure
The structure of cyber-attacks has been defined by Lockheed Martin researchers using
the Cyber Kill Chain intrusion model.
Learning Outcomes
At the end of the lesson, you should be able to:
1. Familiarize cyber-attacks.
2. Prevent cyber-attacks.
Prevent Cyber-Attacks
Protecting the websites and the web servers against cyber-attacks involves the
application of security measures both at a logical level (security of access and services)
and at physical level.
Physical security consist in the closure of IT equipment in a dedicated space and the
provision of access control.
Logical security consists in software that are necessary to control the access to
information and services of a system. The logical level is divided into two categories:
access security level and service security level.
Automatic update of the operating system from the servers is recommended for
troubleshooting security breaches or uncovered programming errors. Updating installed
applications in the operating system is only possible for licensed programs; the use of
pirated programs can induce cybersecurity risks.
A component automatically launched at the start of the operating system that runs in
the background and monitors users activity (running programs, web browsing,
launching email attachments, installing various applications);
A firewall can filter, accept, or block the transfer of data according to established
security policies (blocking data theft or illegal connections to the server).
Protecting personal data is an important aspect. The way how personal information is
provided on websites, should be done as responsibly as possible. The users must be
attentive when providing data that could lead to their identification or identity theft
(name, surname, date of birth, personal identification number, address, telephone, bank
card details, etc.).
Storage the minimum required data online and maximum discretion in providing them
to a third party (users, companies);