Cybersecurity for the Future

Since the first well known and wide spread cyberattack in the mid-1990’s, many professionals in public and private organizations have diligently been studying and working on the problem of cyberattacks. Initially, security companies like Norton, McAfee, Trend Micro, etc. approached the problem from a reactive posture. They knew hackers/malicious attackers were going to strike. The goal of what is now called Intrusion Detection Systems (IDS) was to detect a malicious attacker before an anti-virus, Trojan horse, or worm was used to strike. If the attacker was able to strike the network, security professionals would dissect the code. Once the code was dissected, a response or “fix” was applied to the infected machine(s). The “fix” is now called a signature, and they are consistently downloaded over the network as weekly updates to defend against known attacks. Although IDS is a wait and see posture, security professionals from have gotten much more sophisticated in their approach, and it continues to evolve as part of the arsenal.

Security professionals began looking at the problem from a preventive angle. This moved the cybersecurity industry from defensive to offensive mode. They were now troubleshooting how to prevent an attack on a system or network. Based on this line of thinking, an Intrusion Prevention Systems (IPS) called Snort (2010) was soon introduced. Snort is a combination IDS and IPS open source software available for FREE download. Using IDS/IPS software like Snort allows security professionals to be proactive in the cybersecurity arena. Though IPS allows security professionals to play offense as well as defense, they do not rest on their laurels nor do they stop monitoring the work of malicious attackers which fuels creativity, imagination, and innovation. It also allows security professionals that defend the cyberworld to stay equal or one step ahead of attackers.

Recent Hacking Incidents

  • In October, 2016 a group of hackers launched a distributed denial of service against a DNS (backbone of internet) company called Dyn, that affected the internet services in USA. A lot of popular websites like Twitter, Spotify, CNN, Netflix, Reddit were unavailable to users for a whole day. The cybersecurity services couldn’t stop it because they were using Internet of Things for launching the attack. In layman terms they were using smart phones, not computes to launch the attacks.


  • In July,2017 HBO was hacked. The hackers threatened to release the hacked information and demanded $6 million in bitcoin. Bitcoin/Cryptocurrency is a new technology that enables the transfer of money anonymously. It works on blockchain network, i.e. every device transferring the money becomes a part of the network. As it is not in anybody’s control, it’s impossible to trace the money. The incident lead to a widespread “cryptocurrency-for information” type of blackmail which affected many.


  • In another incident in September,2016 a group of hackers hacked drop box and sold the emails and passwords of the 68 million users on dark web. They sold the information for 2 bitcoinsequivalent to $1,141. Dark web is a part of internet that is not accessible without special softwares and is a big hub of criminal activities.

The benefits of having a disaster recovery plan as a business are:

  • Restoration of person’s data.
  • Increase in employment.
  • Precision in knowing about the disaster.
  • Less number of destruction, saving capital of people.
  • Economy stabilization, as the money spent after destruction can be spent on some other useful activities by the government.
  • Persons working under these organizations will help in saving lives when disaster occurs.
  • Insurance companies will be hiring more employers, which will decline unemployment and save people lives.