The Basics of Digital Security
Digital security involves a variety of methods and techniques to protect computer data, systems, networks, and devices from unauthorized access, attack, and loss. This includes ensuring that information is only visible to authorized parties and encrypting communication back and forth. It also encompasses measures like limiting access to physical spaces and enforcing policies. The most common cyber threats are data breaches and ransomware extortion. But other attacks may seek to disrupt operations, steal proprietary information, or gain competitive advantages. These are sometimes referred to as cyber-kinetic attacks.
The first step in identifying cybersecurity risk is establishing an inventory of physical and logical assets. This includes identifying the crown jewels—the most valuable assets—and other assets attackers would be interested in taking control of (e.g., communications systems, Active Directory servers). In some cases, this might include assessing third-party assets, such as a printer or a Wifi-enabled coffee machine that could be used to access an organization’s network.
A critical aspect of this step is determining the impact of an attack, which might be based on the confidentiality, integrity, or availability of data. It might also be based on the potential cost of an attack, which may include monetary losses, recovery costs, fines or legal repercussions as a result of noncompliance, and damage to brand image.
Ideally, an organization should design its security around techniques and defences that make attacking data and systems more difficult. This is called security by design and can be achieved by incorporating digital security measures into software development processes. A related approach is the use of a minimal operating system, called a unikernel, that only allows a single application to run at a time, reducing the number of entry points for bad actors.