5 How to Protect from Cyber Attacks

We must admit that nothing is unbreakable, in the real life as well as in the digital life.

Let's use the example of a bank storing money versus a database storing customers information.

Protection Hacking Technology Result
Bank Electronic security (security code, ...) Electronic network shutdown Security systems OFF, money is stolen.
Database Text and data encryption (plain text is hidden) DDoS Attack Weaked or stopped decrypt systems, data is stolen

As we can notice in this table, the main results are the same: the network shutdown will stop all plugged services. Therefore, the security elements are unavailable, leaving the resources unprotected like the electronic security of the bank.

The Distributed Denial of Service (DDoS) attack plays the same role as the network shutdown: a remote server could be weaked or even stopped with such attack.
The encryption service would then stopped answering and let an unsecured connection enters the system and collects sensitive data.

Other methods exist to protect from cyber attacks:

  • Use several strong passwords, not always the same like 123456
  • Clean up cookies
  • Crypt data
  • Use a Virtual Network Provider (VPN) to hide your IP address and crypt your communications by using an intermediate server.

A good method is to be 'paranoiac': when paying with a bank card, we check that nobody is watching us. When paying on an internet web site, it is quite the same: you need to validate that the connection is secured (https:// instead of http://).

The same applies for the document or information shared on the net. We have friends in real life and in digital life. But in the digital one, it is easy to have a document shared with the whole planet if permissions are not correctly defined !

Some laws exist in order to reduce the impact of databases of persons. In 1978, the CNIL was created in France, to track such databases. Unfortunately, its means do not allow it to cope with the current volumes and the foreign locations

We can conclude that we have to be our best protection on the Internet. Even if that's sounds like being paranoiac , too much attention is better than not enough.

Contents

  1. Introduction
  2. Data Collection
    1. The illegal ways
    2. The legal ways
  3. Use of digital data
    1. Loyalty cards / Buyers behaviour
    2. The purchase tracking
    3. Cookies
    4. Social networks
    5. The data market
  4. Dangers
    1. Anonymous: presumed guilty !
    2. Invasion of privacy
    3. Identity theft
    4. Right to oblivion
  5. How to Protect from Cyber Attacks
  6. Use cases
    1. Google Apps for the Geneva students
    2. Confidentiality and dependencies in the digital society
  7. Conclusion