Cybersecurity and Operating Systems Management
Cybersecurity and Operating Systems Management
Our world is now revolving around the computer and internet, this brought us good benefits
to make our life easier but it also gives us threats that invade our privacy and confidentiality. As
we continue to development our technologies, the intruders, hackers and software viruses double.
The life of this generation has been posted all throughout the social media site and imagine the
stress that will you feel if someone is invading and manipulating your life without your consent
and will. People mind thinks differently we cannot control others to stop doing unnecessary and
illegal things, what we need to do is to properly manage and control the information we put in
internet, that’s why cybersecurity together with the technology is necessary to development to
Before we develop our cybersecurity system we must first know the systems threats. There
are two general categories of it such as Intruders and Malicious software. Intruders are those
individuals who try to access the information without authority (Masquerader), or the one who has
authority to access and use the system but misuse it purpose (Misfeasor) and the one that takes
control and manage the system without authority (Clandestine User). Malicious Software are
programs that exploit vulnerabilities in computing systems, it has two types the parasitic is a kind
of malware that cannot exist independently and Independent Malware are scheduled programs like
bots and worms. These are some list of schemes that intruders or hackers do to access and control
the information system. First, social engineer where they deceive an individual to get the personal
information to access and control the account. The next scheme is password cracking. People
think putting up a password is a kind of security but hackers have ways to encrypt it by using
system and methods such as dictionary approach, hybrid algorithm, rule-based cracking paradigm
and brute force. Scanners are also type of intruders schemes where they attacked the weakest point
Cybersecurity and Operating Systems Management
Galang, Monette P. – BSA Bridging Program Batch 1.1
of the systems. IP (Internet Protocol) Spoofing is a schemes where the source of information has
been changed that will lead to system breakdown. And the last known schemes are call Trojan
Horses, it is a system that disguise as something useful but ended up as a virus that makes the
system stop. Intruders or Malicious Software are made by person, it also has weakest point that
Cybersecurity came from the word cyber which means things related to information
technology and security which means to protect or secure somethings. Cybersecurity is the systems
where information technology is being manage, control and secure. The purpose of cybersecurity
is to secure the confidentiality, availability and integrity of the information. As the number of user
and information we put in a system or internet increase throughout the time, cybersecurity and
operating management play vital roles keep the information private, safe and confidential. A
protect the corporate assets such as system, networks, data and application. These are things we
must invest in developing our cybersecurity system, first we must have knowledge on how we will
implement and use the system, second we must train and direct the people who will handle the
tools and system that will be used and the technologies itself.
After planning, a policy must be drive of. Policy will be the guide to manages the risk of
cyber-attacks by putting in depth defense. Policies will cover the password management,
proprietary information, anti-virus, incident handling and back and recovery. Password
management is the first line of defense where its controls who has the right to access the systems.
Anti-virus is a pre-defense mechanism that prevent cyber-attacks before it may cause problems.
Incident handling will focus on how the organization will manage when the incident occurs.
Cybersecurity and Operating Systems Management
Galang, Monette P. – BSA Bridging Program Batch 1.1
Backup is the process of having a copies of information in case the original data loss and recovery
system is the process of retaining the old data. And Proprietary Information is the process of how
the information will be handle and manage through time. Regular evaluation is necessary so we
can tell the policy we are implementing is effective and efficient and our objective has been
achieved.
defense, backup and recovery, encryption and digital signature are example of cybersecurity
system. Perimeter defense limits the outgoing or ingoing information in the system. This was set
to protect the resources of the information, the host of the system and the system itself. These
solution includes the following firewalls, routers, intrusion detection and virtual private networks.
Backup and recovery system are responsible in saving and availability of the information in case
the system have corrupted. Encryption is a technique applied cryptographic algorithms such as
passwords, usernames, digital signatures and etc. that will provide the access, confidentiality,
Technologies comes up with many positive things in our life, where sometimes we rely our
life on it. Putting up confidential information in a system where everyone has access may danger
cybersecurity management system that provides protection in our data, network, applications and
system.