CYBERSECURITY
What is Cybersecurity about?
Cybersecurity refers to the practice of protecting computer systems, networks, programs, and data from digital attacks. These attacks aim to access, disrupt, or destroy sensitive information or extort money. Cybersecurity encompasses a wide range of measures and technologies designed to safeguard digital assets and ensure the confidentiality, integrity, and availability of data.
Aspects of cybersecurity include
Network Security
This involves protecting the integrity and privacy of data as it is transmitted across networks. It includes measures such as firewalls, intrusion detection systems, and virtual private networks (VPNs).
Endpoint Security
Endpoint devices such as computers, smartphones, and tablets are often targets for cyber-attacks. Endpoint security solutions aim to secure these devices from malware, ransomware, and other threats.
Identity and Access Management (IAM)
IAM involves controlling access to computer systems and networks based on users' identities and roles. This includes user authentication, authorization and privileges management.
Data Security
Data security focuses on protecting the confidentiality and integrity of data stored on servers, databases, and other repositories. Encryption, access controls, and data loss prevention (DLP) technologies safeguard sensitive information.
Application Security
Application security involves securing software applications and preventing vulnerabilities that could be exploited by attackers. This includes secure coding practices, regular security testing, and patch management.
Cloud Security
With the increasing adoption of cloud computing, organizations need to ensure the security of data and applications hosted in cloud environments. Cloud security measures include encryption, identity management, and monitoring.
Incident Response
Despite preventive measures, security incidents may still occur. Incident response involves detecting, analyzing, and mitigating security breaches to minimize damage and restore normal operations.
Security Awareness Training
Human error is a common cause of security breaches. Security awareness training educates employees about cybersecurity risks and best practices to mitigate them.
Cybersecurity is a dynamic field that evolves alongside technological advancements and emerging threats. It requires a combination of technical solutions, policies, and procedures to effectively protect against cyber-attacks and ensure the resilience of digital infrastructure.
Cybersecurity Service Objectives
Organization Assessment, Project Development and Implementation.
Vulnerability Identification, Mitigation and Prevention.
McMartin Consulting’s Security Assessment Services were developed to identify the vulnerabilities of your current network and get a clear picture of how well your current security system is performing. This comprehensive view of our clients’ current level of prevention helps us ensure they have the technology to protect their infrastructure and the tools and procedures to use that technology effectively.
This is complemented by our understanding of regulatory and standards drivers (NERC CIP, ISA99, NIST IR 7628, SP800-82, ISC2, and ISO/IEC 27001), which results in a full suite of cybersecurity assessment services:
Cybersecurity History – Hacking & Data Breaches
Cybersecurity is thought to have started in 1971 when Bob Thomas, a computer programmer with BBN, created and deployed a virus that served as a security test. It was not malicious but did highlight areas of vulnerability and security flaws in what would become “the internet.”
The virus, named after a Scooby Doo villain, “Creeper,” was designed to move across ARPANET (Advanced Research Projects Agency Network) – the forerunner to what we now call the internet. ARPANET was established by the U.S. Department of Defense.
Thomas created the computer worm to be a non-harmful, self-replicating experimental program. It was intended to illustrate how mobile applications work, but instead, it corrupted the DEC PDP-10 mainframe computers at the Digital Equipment Corporation, interfering with the teletype computer screens that were connected. All the users could see on the screen were the words, “I’m the creeper; catch me if you can!”In response, Ray Tomlinson, Thomas’ colleague, created the Reaper Program. It was similar to the Creeper. It moves through the internet, replicating itself and finds copies of the Creeper. When it locates the copies, it logs them out, rendering them impotent. The Reaper was the first attempt at cybersecurity – the first antivirus software program.
Monroe College - Bronx,NY.
Who was the first hacker?
Technically, the very first cyberattack occurred in France in 1834. Two thieves stole financial market information by hacking the French Telegraph System. Other “hackers” emerged over the years to disrupt phone service and wireless telegraphy, but it wasn’t until 1940 that things got interesting.
In 1940, Rene Carmille became the first ethical hacker. He was a punch-card computer expert and member of the Resistance in France during the Nazi occupation. He owned the machines that France’s Vichy government used to process information. He discovered that the Nazis were using the machines to track down Jews, so he offered to allow them to use his machine. They took the bait, and he then used that access to hack them and disrupt their efforts. In 1962, the first computer passwords were set up by MIT to limit students’ time on the computers and provide privacy for their computer use. Allan Scherr, an MIT student, created a punch card that triggered the computer to print all the passwords in the system. He then used them to get more computer time and distributed them to his friends. They also hacked into their teacher’s accounts and trolled them by leaving taunting messages.
The first computer virus is believed to have been used in 1969 at the University of Washington Computer Center. A person who has never been named installed a program that came to be known as “RABBITS Virus” on one of the computers. The program began replicating itself until it overwhelmed the computer, causing it to shut down. Kevin Mitnick is often referred to as the first cybercriminal. From 1970 until 1995, Mitnick managed to access some of the world's most guarded and secure networks, including Motorola and Nokia. He used complex social engineering schemes that tricked key company personnel into providing him with passwords and codes, which he used to penetrate the internal computer systems. He was arrested by the FBI and faced several federal charges. After prison, Mitnick became a cybersecurity consultant and author.
The first computer virus is believed to have been used in 1969 at the University of Washington Computer Center. A person who has never been named installed a program that came to be known as “RABBITS Virus” on one of the computers. The program began replicating itself until it overwhelmed the computer, causing it to shut down. Kevin Mitnick is often referred to as the first cybercriminal. From 1970 until 1995, Mitnick managed to access some of the world's most guarded and secure networks, including Motorola and Nokia. He used complex social engineering schemes that tricked key company personnel into providing him with passwords and codes, which he used to penetrate the internal computer systems. He was arrested by the FBI and faced several federal charges. After prison, Mitnick became a cybersecurity consultant and author.
Monroe College-Bronx
What is the importance of cybersecurity in the modern internet age?
Cybersecurity is big business these days, especially now that the internet is a significant part of our everyday lives. Most companies and governmental agencies rely on it for everything from record storage to operations. It has become a necessity. As the internet has grown, so have the threats.
Cybersecurity helps protect individuals, businesses, and governments from people who seek to gain access to systems illegally and create havoc through:
- Viruses
- Phishing
- Man in the middle attack.
- Password breach.
- Denial of Service attack.
- SQL Injection.
- Ransomware
These attacks can destroy computers and digital devices like tablets and smartphones. They can also deceive people into giving out their login information, which can impact financing, work, email and other sensitive areas. They can invade a system and steal information, including people’s identities, which leads to identity theft.
Cybersecurity Service Objectives
McMartin Consulting’s Security Assessment Services were developed to identify the vulnerabilities of your current network and to get a clear picture of how well your current security system is performing. This comprehensive view of our client’s current level of prevention helps us ensure they have the technology to protect their infrastructure and the tools and procedures to use that technology effectively.
This is complemented by our understanding of regulatory and standards drivers (NERC CIP, ISA99, NIST IR 7628, SP800-82, ISC2, and ISO/IEC 27001), which results in a full suite of cybersecurity assessment services:
Vulnerability and Penetration Testing Services
Vulnerability and penetration testing of infrastructure (servers/workstations/other endpoints, along with network devices) are designed to find and validate vulnerabilities caused by misconfigured systems or missing patches.
AMI Security Assessment
This is a targeted assessment that focuses on the inherent security of a proposed or actual AMI deployment, from the meters (and their security as built by the vendor) to the head-end and AMI-specific infrastructure like analytics and MDMS infrastructure.
NERC CIP Gap Analysis
The final report provides an overall look at the policies, procedures and actual activities (including the creation and management of artifacts) to find places where intended and actual compliance activities do not match and where potential violations may be found. It also provides suggested corrective actions.
Physical Security Assessment
Examining the physical security of a facility or an entire organization, considering access controls, access monitoring, processes and procedures around granting/controlling/revoking access, and environmental factors.
Network Architecture Security Assessment
Examining a network’s overall architecture, mapping data flows, and security controls to find opportunities for improvement in network design from the perspective of security and appropriate reliability.
Smart Grid Security Assessment
An in-depth examination of smart grid security as implemented, taking into account the particular technologies implemented, the security around them, potential impacts relating to subversion or interruption of control, and the regulatory outlook with regard to compliance.
Program Planning, Design and Implementation
Martin Consulting’s cybersecurity professionals have authored policies and procedures to meet federal, state, and local regulations, sponsored successfully funded grant applications and aligned security programs to meet international business requirements.
Most projects are initiated by assessing documents and assets and evaluating strategic cybersecurity risks to current and planned mission-critical systems.
Our design and assessment programs are based on the most rigorous industry standards and regulations. We ensure a smooth transition once the action plan is crafted and ready to be implemented.
Our design and assessment programs are based on the most rigorous industry standards and regulations. We ensure a smooth transition once the action plan is crafted and ready to be implemented.
Monitoring and Maintenance
Enhancing cybersecurity posture frequently involves implementing updated or refined policies as a crucial follow-up measure—remediation planning, tracking, and implementation close the cycle in preparation for re-evaluation.