{"id":209111,"date":"2024-02-29T22:30:13","date_gmt":"2024-02-29T22:30:13","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/02\/29\/what-is-cybersecurity-fortune-education\/"},"modified":"2025-06-25T17:21:26","modified_gmt":"2025-06-25T17:21:26","slug":"what-is-cybersecurity-fortune-education","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/02\/29\/what-is-cybersecurity-fortune-education\/","title":{"rendered":"What is cybersecurity? | Fortune Education"},"content":{"rendered":"<p> [ad_1]<br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/content.fortune.com\/wp-content\/uploads\/2024\/02\/GettyImages-1431662905_678ab5-e1708612015688.jpg?w=2048\" \/><\/p>\n<p>On May 7, 2021, Colonial Pipeline learned a painful lesson about the need for cybersecurity. On that date, the oil pipeline<a href=\"https:\/\/www.energy.gov\/ceser\/colonial-pipeline-cyber-incident\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> fell victim to a ransomware attack<\/a>, impacting the computerized equipment used to manage its system. To contain the attack, the oil pipeline halted all operations before paying the hacker group DarkSide the equivalent of<a href=\"https:\/\/www.pbs.org\/newshour\/economy\/colonial-pipeline-confirms-it-paid-4-4-million-to-hackers\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> $4.4 million in bitcoin<\/a> to restore the system.<\/p>\n<div>\n<p>This ransomware attack is just one high-profile example of the importance of cybersecurity, a field that aims to protect electronic assets that store and transmit information. As the digital realm continues to extend into practically all elements of work, life, and everything in between, the need for cybersecurity professionals will only grow.\u00a0<\/p>\n<div class=\"sc-bee345e1-0 gjbbDt product-card-wrapper undefined\">\n<p>ADVERTISEMENT<\/p>\n<div class=\"sc-bee345e1-1 kKnppR content-wrapper\">\n<div class=\"sc-bee345e1-5 jZpLCx content\">\n<h4 class=\"sc-bee345e1-6 knmwqY card-title hasSubtitle\"><a href=\"https:\/\/ischoolonline.berkeley.edu\/requestinfo\/cyber\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \" aria-label=\"Go to Master\u2019s in Cybersecurity Online From UC Berkeley page\">Master\u2019s in Cybersecurity Online From UC Berkeley<\/a><\/h4>\n<p><span class=\"sc-bee345e1-7 knBRCj isAdvertisement \"> <!-- -->Earn a Master\u2019s in Cybersecurity Online in Just 20 Months<!-- --> <\/span><a href=\"https:\/\/ischoolonline.berkeley.edu\/requestinfo\/cyber\/\" target=\"_blank\" class=\"sc-bee345e1-21 ZiJTY button-mobile\" rel=\"noopener\">Visit Website<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"arrow-svg\" width=\"50\" height=\"50\" viewbox=\"5 5 14 14\" fill=\"none\" fill-opacity=\"0\" stroke=\"#111111\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"arcs\"><path d=\"M9 18l6-6-6-6\"\/><\/svg><\/a><\/div>\n<div class=\"sc-bee345e1-22 cYxxWk section-container\">\n<p><section id=\"sectionContent-0\" aria-labelledby=\"sectionHeader-0\">The UC Berkeley School of Information\u2019s online Master of Information and Cybersecurity prepares students to become leaders in cybersecurity. No GRE\/GMAT required.<\/section>\n<\/p>\n<div class=\"sc-bee345e1-10 eFxwOq accordion-wrapper\">\n<section id=\"accordionContent-0\" aria-labelledby=\"accordionHeader-0\" class=\"sc-bee345e1-13 jWEBUa\">The UC Berkeley School of Information\u2019s online Master of Information and Cybersecurity prepares students to become leaders in cybersecurity. No GRE\/GMAT required.<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>What is cybersecurity?<\/strong>\u00a0<\/h2>\n<p>Cybersecurity is the protection of computer systems and networks from attacks by malicious actors. If undeterred, these attacks can result in the leak of unauthorized information, disruption of services, or damage to hardware and software. As our world has become increasingly reliant on computers, so has the need for cybersecurity.<\/p>\n<p><a href=\"https:\/\/www.jimmiehlenz.com\/bio\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">Jimmie Lenz<\/a>, director of the<a href=\"https:\/\/getinfo.pratt.duke.edu\/cyb\/?source_code=GOOGLE&amp;utm_source=google&amp;utm_medium=search-paid&amp;utm_campaign=rnl-cyb-google-search-10566143940&amp;utm_content=688103123728&amp;utm_term=duke%20cybersecurity&amp;utm_campaign_id=10566143940&amp;agid=160762419071&amp;search_keyword=duke%20cybersecurity&amp;search_type=b&amp;netid=g&amp;adid=688103123728&amp;dvt=c&amp;ptid=&amp;cq_cmp=10566143940&amp;cq_con=160762419071&amp;cq_term=duke%20cybersecurity&amp;cq_med=&amp;cq_plac=&amp;cq_net=g&amp;cq_plt=gp&amp;gad_source=1&amp;gclid=CjwKCAiA_tuuBhAUEiwAvxkgThMWXcpbQ-JfCR_LLc4MU1TH1xQZY8ZBF77KQGDyikzTb9imY_vZMRoCVuwQAvD_BwE\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> master\u2019s of engineering in cybersecurity<\/a> and<a href=\"https:\/\/fintech.meng.duke.edu\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> master\u2019s of engineering in fintech programs at Duke University<\/a>\u2019s Pratt School of Engineering,\u201d defines cybersecurity as the \u201cprotection and detection of electronic attacks.\u201d<\/p>\n<p>\u201cAttacks come in a number of different forms,\u201d he says. \u201cMost common are attacks that people receive via email, phishing type attacks, and spear phishing type attacks that most people are pretty familiar with.\u201d<\/p>\n<p>From fighting off cyber criminals to securing systems to fending off nation-states who wish to challenge the integrity of governmental systems, the field of cybersecurity is interesting and ever evolving.<\/p>\n<h2 class=\"wp-block-heading\"><strong>What are 7 types of cybersecurity?<\/strong>\u00a0<\/h2>\n<p>To protect their digital systems, organizations must consider different types of cybersecurity. As the Colonial Pipeline can attest to, a cybersecurity breach can prove costly.\u00a0<\/p>\n<p><strong>Application security:<\/strong> As the name suggests, application security concerns the unauthorized use and access of software and related data. Despite the best efforts of developers, vulnerabilities can be created during the development and publishing of an app. Application security aims to address these flaws through software\u2019s entire life cycle.<\/p>\n<p><strong>Cloud security:<\/strong> Cloud security is a broad category that includes all technology, policies, and controls used to secure cloud computing data, applications, services, and infrastructure. There are typically two categories of cloud security concerns: issues faced by the organizations providing infrastructure, software or platform services through the cloud, and the issues of their customers who store data and host applications on the cloud.\u00a0<\/p>\n<p>As organizations increasingly incorporate more cloud-based tools and services, the importance of cloud security will only grow. \u201cCloud security is getting larger and larger as more and more people avail themselves of those tools,\u201d Lenz says. Generally, the responsibility for handling cloud security is shared between cloud service providers and organizations.<\/p>\n<p><strong>Critical infrastructure security:<\/strong> The cyberattack on Colonial Pipeline illustrates the importance of critical infrastructure security. Large infrastructure systems\u2014such as those involving communications, transportation, and energy\u2014must be protected. \u201cThat\u2019s the one that we fear a lot,\u201d says<a href=\"https:\/\/azcast.arizona.edu\/person\/robert-honomichl-phd\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> Rob Honomichl<\/a>, assistant professor of cyber operations at the<a href=\"https:\/\/azcast.arizona.edu\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> University of Arizona\u2019s College of Applied Science &amp; Technology<\/a>. \u201cWe\u2019ve seen, in other countries, where they\u2019ve done some damage, taking out grids and things like that.\u201d<\/p>\n<p><strong>Data security:<\/strong> This form of cybersecurity concerns protecting the confidentiality, availability and integrity of digital assets. From health records to credit card information, data security is of vital importance in our digital age. Lenz says this is probably the largest subject in the field of cybersecurity.\u00a0<\/p>\n<p><strong>Endpoint security:<\/strong> Endpoint security involves the physical devices that connect to network systems, such as laptops, desktops, mobile devices, and servers. These devices are the most common entry point for cyberattacks. Endpoint security aims to protect these devices and their data from vulnerabilities.\u00a0<\/p>\n<p><strong>Internet of things security:<\/strong> The \u201cinternet of things\u201d (IoT) is a term to describe devices with sensors, software, processing ability, and other technology that exchange data with other devices through the internet. IoT security aims to minimize the vulnerabilities that these devices present. In 2013, retail giant Target was the<a href=\"https:\/\/www.computerworld.com\/article\/2487452\/target-attack-shows-danger-of-remotely-accessible-hvac-systems.html\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> victim of a data breach<\/a> where hackers compromised the data of 40 million shoppers after gaining access to the company\u2019s payment system through internet-connected HVAC units. Target<a href=\"https:\/\/www.nbcnews.com\/business\/business-news\/target-settles-2013-hacked-customer-data-breach-18-5-million-n764031\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> paid a $18.5 million settlement<\/a> to those affected.<\/p>\n<p><strong>Network security:<\/strong> Network security involves protecting the hardware and software of a network to stave off service disruptions and unauthorized access. Most cyberattacks begin with a breach of network security. This branch of cybersecurity aims to observe, detect, and respond to network threats. Honomichl says an organization\u2019s network administrator and security team must consider a wide variety of threats to their network, including firewalls, human scams, phishing through ransomware, and other issues.<\/p>\n<h2 class=\"wp-block-heading\"><strong>8 types of cybersecurity threats<\/strong><\/h2>\n<p>Just as there are many types of cybersecurity, there are also many types of threats. These threats may overlap or be used in conjunction to target organizations. And like everything else in the field of cybersecurity, these threats are constantly evolving.\u00a0\u00a0<\/p>\n<p><strong>Automated teller machine (ATM) cash out:<\/strong> This type of attack usually impacts small-to-medium-sized financial institutions. In an ATM Cash Out, large cash withdrawals are made at several ATMs in many different regions. It may also involve large withdrawals from one ATM. In this attack, cyber criminals change the settings on an ATM through web-based control panels to allow an unlimited withdrawal of funds.\u00a0<\/p>\n<p><strong>Corporate account takeover:<\/strong> In a corporate account takeover, or CATO, cyber thieves impersonate a business and conduct unauthorized financial transactions. These funds are then sent to accounts belonging to cyber criminals. These attacks often target businesses with weak safeguards and few controls over online banking systems.<\/p>\n<p><strong>Distributed denial of service:<\/strong> A distributed denial of service\u2014or DDoS\u2014attack overwhelms online services with excessive traffic, making websites unavailable for use or slowing down response time. These attacks are frequently used to create a distraction so that other kinds of fraud can be attempted. \u201cThese were really, really popular a few years ago as a way to shut down different sorts of websites,\u201d Lenz says. \u201cThese have become a little less popular lately.\u201d<\/p>\n<p><strong>IP spoofing:<\/strong> In this type of attack, a cyber criminal creates a false source Internet Protocol (IP) address for the purpose of impersonating another computing system. This allows hackers to steal data, infect devices with malware, and crash servers without being detected.<\/p>\n<p><strong>Malware:<\/strong> Malware are programs that can impact data, applications, and operating systems. After being secretly inserted into a system, malware can cause widespread damage and disruption. There\u2019s also spyware, malware created to violate privacy. Spyware has become more common in recent years and can be used to enact financial fraud or track a person\u2019s activities.<\/p>\n<p><strong>Phishing<\/strong>: Phishing is a form of social engineering that attempts to obtain sensitive information. With phishing, victims are sent fraudulent messages that appear to be sent by a trustworthy business or individual. Phishing attempts often ask victims to respond to a link to a fake website or email to get them to provide confidential information. \u201cPeople need to be really, really vigilant about clicking on any kind of links or opening up any kind of attachment that is sent to them,\u201d Lenz says. \u201cThese are getting better and better and better all the time.\u201d<\/p>\n<p><strong>Ransomware:<\/strong> Through malware, ransomware prevents or limits a user from accessing their system. A widely used method of attack, ransomware asks users to pay a ransom to regain access to systems or data, usually asking for online payment through bitcoin or other online payment methods.<\/p>\n<p><strong>Spam: <\/strong>We\u2019ve all encountered unwanted messages and emails known as spam. Typically, these messages serve a commercial purpose, but they can also conceal malicious attempts to access your computer.\u00a0<\/p>\n<h2 class=\"wp-block-heading\"><strong>Cybersecurity careers<\/strong>\u00a0<\/h2>\n<p>From large corporations to governmental entities to healthcare systems, it seems like practically every institution needs cybersecurity professionals in a wide variety of roles. Here are a few:<\/p>\n<ul>\n<li>Cyber crime analysts provide expertise in creating cybersecurity safeguards and responding to incidents.\u00a0<\/li>\n<li>IT auditors review information systems and participate in risk assessments.\u00a0<\/li>\n<li>Cybersecurity engineers manage infrastructure and applications, and create new policies and procedures to safeguard systems.<\/li>\n<\/ul>\n<p>\u201cThey really run the gamut,\u201d says Lenz of the opportunities on the market. \u201cThis is a vital function for any sort of organization.\u201d\u00a0\u00a0<\/p>\n<p>The U.S. Bureau of Labor Statistics states that information security analysts\u2014a title similar to cybersecurity professionals\u2014is the<a href=\"https:\/\/www.bls.gov\/ooh\/fastest-growing.htm\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> fifth fastest growing occupation<\/a>. In 2022, median pay for an information security analyst<a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm#tab-1\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> was $112,000 a year<\/a>.<\/p>\n<p>There are an estimated 3.5 million unfilled cybersecurity jobs across the globe, <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \">according to Cybersecurity Ventures<\/a>, a researcher and publisher that covers the international cyber economy. That follows a 350% growth in the number of open cybersecurity jobs between 2013 and 2021.<\/p>\n<h2 class=\"wp-block-heading\"><strong>The takeaway<\/strong>\u00a0<\/h2>\n<p>Cybersecurity is a broad and dynamic field that\u2019s in high demand and pays well. There are a variety of cybersecurity types and roles to specialize in, and the field is constantly changing.<\/p>\n<p>Honomichl recommends that cybersecurity aspirants visit<a href=\"https:\/\/www.cyberseek.org\/\" target=\"_blank\" rel=\"noopener\" class=\"sc-47dba8f0-0 iRbseu styledLinkColor \"> Cyberseek<\/a>, an online tool that aims to help explain the relevant credentials and career pathways within the field.<\/p>\n<p>Lenz says it\u2019s important for a person to figure out which segment of cybersecurity they\u2019re interested in before setting off on a career within the field. \u201cNetwork with people first, and then start to look at what training you need for a particular role.\u201d<\/p>\n<\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/fortune.com\/education\/articles\/what-is-cybersecurity\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] On May 7, 2021, Colonial Pipeline learned a painful lesson about the need for cybersecurity. On that date, the oil pipeline fell victim to<\/p>\n","protected":false},"author":1,"featured_media":209112,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[149],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209111"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=209111"}],"version-history":[{"count":1,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209111\/revisions"}],"predecessor-version":[{"id":341192,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/209111\/revisions\/341192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/209112"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=209111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=209111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=209111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}