Skip to main content
Workforce LibreTexts

6.9: Summary

  • Page ID
    22757
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    Summary

    People, businesses, and even nations can all fall victim to cyberattacks. There are different types of attackers, including amateurs attacking for fun and prestige, hacktivists hacking for a political cause, and professional hackers attacking for profit. Besides, nations that attack other nations to gain an economic advantage by intellectual property theft or harm or destroy another country's properties. The vulnerable networks are PC and server business networks and the thousands of computers on the Internet of Things.

    Fight against cyberattacks requires people, processes, and technology to follow best practices and good security policies. There are tools that users can employ to protect personally identifiable information. There are policies that companies can require of their customers and employees to protect their resources. Companies can also invest in dedicated Security Operations Centers (SOCs) for cybercrime prevention, identification, and response.

    The human element is also a major factor in security incidents. With social engineering and insider risks, no organization can rely solely on technology. A strong security culture with training, leadership buy-in, and thoughtful hiring is key. Investment in around-the-clock security operations centers also enhances threat monitoring and response capabilities.

    Finding the right balance between security, usability, and availability allows organizations to implement effective defenses while still furthering business goals. With vigilant governance and coordination between security staff, management, employees, and technical controls, companies can build resilience against today's ever-evolving cyber risks.


    This page titled 6.9: Summary is shared under a CC BY 3.0 license and was authored, remixed, and/or curated by Ly-Huong T. Pham and Tejal Desai-Naik (Evergreen Valley College) .

    • Was this article helpful?