The Fundamental of Cyber Attacks Counter Measure

The Fundamental of Cyber Attacks Counter Measure

Cybercrime is getting worse every year, worldwide spending on cybersecurity is forecasted to reach $133.7 billion, as predicted by Gartner. At first, the cyber attack was made by many hackers on the based of fun or testing their capability. Just like what they did at the beginning of 2000 when the website of the Science and Technology Agency was altered during unauthorized access and hacking captured the public’s attention. The table started turning in 2010 when there was a cyber attack on a nuclear fuel facility in Iran. The cyberattacks aimed at important companies and infrastructure are increasing with the high cost of the economic failure of even national defence.

The types and strategies of cyber-attack are becoming harder to be solved, such as malicious emails are sent to the targeted company’s employees using captivating information to lure them. The curious employees open the attachment and the malware spread all over the company’s technologies, as well as ruin everything it has. Not to mention the number of data alteration that demands a ransom in exchange for restoring the damaged system. The increment on the term of methods isn’t surprising since cybercrime is considered as “a crime that pays”. In order to prevent any database leakage or other cybersecurity incidents, there are many countermeasures that the individual, company, organization, or institution can take. They are classified into categories: legal, technical, organizational, capacity building, and cooperation aspects, as defined by the International Telecommunication Union (ITU).

  1. Legal Measures

These measures are meant to provide legislations and regulatory framework that can be applied to protect the critical infrastructure in the cyber world. The good practices that can be recommended are:

  • Perform information security audits as the mandatory periodic assessment of critical infrastructure
  • Make sure the compliance of software and hardware tools according to the recognized security standards such as ISO 27001.
  1. Technical Measures

They can be considered as technological tools (software and hardware) that can prevent, detect, mitigate, and respond to cyber-attacks. Those measures are including:

  • The use of internationally recognized security standards within organizations, especially for the critical infrastructure.
  • The use of highly trusted security tools, such as firewalls, Intrusion Detection System, Intrusion Prevention System, Antivirus/ Anti-malware.
  • Apply measures of physical security, access control, patching and upgrading, as well as forensics.
  • Maintain the development of incident response-ability
  1. Organizational Measures

Organizational Measures are crucial as the base of proper implementation of any type of national initiative or policy. The recommended measures are:

  • Create the policy for national critical infrastructure protection
  • A national framework needs to be made for the implementation, evaluation, and maintenance of cybersecurity policies.
  • For organization, there will be the need for defining an information security program
  • Create the plan on a national contingency
  • Build a national agency for the application of the critical infrastructure protection policy.
  • The cyber resilience of critical infrastructure needs to be assessed through national exercise
  • Organizations need to do security audits in order to check their cybersecurity preparedness
  1. Capacity Building Measures

The measures have an objective to enhance knowledge and know-how in order to promote cybersecurity. In this section, these followings are recommended:

  • Encourage IT specialist in the internationally recognized certification of cybersecurity programs, especially in critical infrastructure sectors.
  • Create training programs and periodic awareness for employees
  1. Cooperation Measures
  • These cooperation measures need to be taken in order to establish a partnership between different stakeholders. We will need cooperation to increase the cyber resilience of the organizations in the war with cyber threats. The measures are organized as follows:
  • Craft many trusted information sharing mechanisms about threats and vulnerabilities between private and public stakeholders
  • The promotion of cybersecurity and increment of resilience in handling cyberattacks can be done through the establishment of a cooperation framework between industry and research
  • A cooperation framework between countries on different aspects of cybersecurity needs to be established
  • Make a contribution internationally to protect the cyber world

As the conclusion of many measures mentioned above, the protection of cybersecurity needs to be strengthened in every aspect. It will need tons of cooperative and intense efforts from every individual, company, organization, or nation to handle the development of cyber-attack. That kind of development requires a progressive system that will keep up with the vicious cycle of cybercrime. Therefore, the easiest, important, and effective action (which is included in the measures) is to use dynamic security. Dynamic cybersecurity has dynamic module generator that can constantly create dynamic security modules with the latest security level. Each module is supplied in unlimited quantity, has unique code, and short life span.

Leave a Reply