Connect with us

Hi, what are you looking for?


Understanding Cyber Defense and Security

Some so-called pundits in the field of cybersecurity would say that you would simply need a common sense to prevent your computer system from being hacked and attacked by malware. They would further contend that with the mere use of common sense, your computer will be safe and that you basically don’t need an antivirus software to keep your files safe.

This contention may be a bit naïve, considering that the malware that moves across the web are becoming more and more sophisticated and virulent. Hence, using your mere common sense and opting not to visit sites which look shady and suspicious would definitely leave your computer system very much vulnerable to the attacks of malware. There are definitely some flaws in any network system, even in the seemingly most secured computer system. These flaws and weaknesses are usually the targets of hackers.

Hackers have varied reasons on why they engage in hacking. Some hack to prove something; while some others simply hack for profits. Others, however, engage in hacking to prove that any secured system is not impregnable to cyber-attack. The latter type of hackers engages in hacking to come up with a network analysis and visibility tools probing.

The Need for Proactive Cyber Defense

There are different forms of cyber defense. You can, for example, install some security mechanisms into your computer system hoping that cyber-attackers will never be able to breach those mechanisms. Afterward, you would simply passively wait at the sideline, praying that hackers and makers of malware are complacent enough not to create new malware that can penetrate your system; however, hackers do not sleep on their jobs. They are constantly figuring out ways to break into various computer systems.

On the other hand, you can always set up a reactive defense system that reacts only when there is an imminent and ongoing threat to your computer system. This reactive defense system is not totally effective and may end up not nipping the problems in the bud. Hence, if you truly value the files, security, and integrity of your computer system or network, you should be very meticulous about the security aspect of your network. You need to have a proactive network security that is proactively preemptive.

Proactive cyber defense is an effective way of preventing and neutralizing the onset of cyber hacking or attack. It is preemptive, that is, it precludes the hackers from setting up his/her plans by attacking the hackers while the hackers are still insidiously planning their attacks.

Stages of a cyber-attack

There are basically three stages in cyber-attack, namely: before, during, and after the attack. Hence, if you want to prepare and equip your system with proper security measures, you got to take into account these three stages of cyber-attack, and you have to be cognizant of the measures that you should take into consideration and apply during each stage of the attack.

Before the attack, you should have taken the necessary measures to defend your system from any type of attack.  During the attack, it is necessary to respond appropriately and quickly and make sure that the attack is contained. After the attack, you definitely need to learn from experience in order to further enhance your system’s security and defense.

Written By

Click to comment

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You May Also Like


Humans seem to be not satisfied with the four-dimensional space in which they move, and this apparent dissatisfaction with the present time and space...


If you are familiar with the decisive battles in the history of the world, you would readily see that most decisive victories in war...


There are many network managers who are losing hope because of the obvious fact that it is really impossible to prevent cyber-attacks; moreover, it...


There is a certain truth to the fact that it is often impossible to eliminate cyber-attacks, for these attacks will always be there, considering...