Rising KashmirRising KashmirRising Kashmir
  • Home
  • Top Stories
  • News
    • Kashmir
    • City
    • Jammu
    • Politics
  • National
  • Health
  • Anchor
  • Features
  • Interview
  • Video
  • Sports
Search

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022

Categories

  • Anchor
  • Breaking
  • Business
  • City
  • Developing Story
  • Editorial
  • Education
  • Features
  • Health
  • Interview
  • Jammu
  • Jammu and Kashmir News
  • Kashmir
  • Kashmir Tourism
  • Kath Bath
  • National
  • Opinion
  • Politics
  • SEO
  • Sports
  • Technology
  • Top Stories
  • Trending
  • Uncategorized
  • Video
  • Viewpoint
  • World
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Cyber Security Measures: Protecting digital assets from cyber threats
Share
Notification Show More
Font ResizerAa
Rising KashmirRising Kashmir
Font ResizerAa
  • Home
  • Top Stories
  • News
  • National
  • Health
  • Anchor
  • Features
  • Interview
  • Video
  • Sports
Search
  • Top Stories
    • Developing Story
    • Anchor
    • Breaking
    • Business
    • Editorial
    • Education
    • Features
    • Health
    • Interview
  • More
    • National
    • Politics
    • Opinion
    • Technology
    • Sports
    • Trending
    • World
  • Kashmir
    • City
    • Jammu
    • Jammu and Kashmir News
    • Kashmir Tourism
    • Kath Bath
    • Video
    • Viewpoint
Follow US
© 2024. All Rights Reserved.
Rising Kashmir > Blog > Viewpoint > Cyber Security Measures: Protecting digital assets from cyber threats
Viewpoint

Cyber Security Measures: Protecting digital assets from cyber threats

The cyber security measures that are in place can lapse over time, creating opportunities for breaching of the system

ER KHAWAR SULTAN
Last updated: August 22, 2025 12:01 am
ER KHAWAR SULTAN
Published: August 22, 2025
Share
9 Min Read
SHARE

Cyber security—measures taken to protect computers and computer networks from accidental or malicious harm—is an ongoing process. The security of a system is only as strong as its weakest link. When a fault is identified and corrected, the system tends to be stronger. This state is often transient, as other faults are eventually be detected and exploited.

The very nature of the Internet makes cyberspace vulnerable to attack. The vast majority of computers connected to the Internet are IBM compatible, as are the few operating systems that control their function. An attacker who can find a security flaw in even one computer could gain access to many computers that are not protected from intrusion.

An attack can be circuitous, involving many computers. Some computers are used surreptitiously in the attack; thus, the source of an attack becomes difficult to trace, especially if the attack has disguised the source address. While in the past, most breaches of computer security were mischief caused by computer hackers, increasingly; the information contained within computer databanks is probed and in some cases, altered. Such disabling of computer networks can be crippling to business or infrastructure.

Cyber Security Threats

A practice dubbed ”dumpster diving“ involves routing through the trash to recover paperwork or even used computer components that have been discarded. Even in Cyber Security the computer age, many people print information and then discard it. A diligent search of a person’s trash can sometimes obtain a great deal of sensitive information.

Intelligence personnel masquerading as janitors or other staff can gain access to computers in off-hours, and, utilizing deciphered user names and passwords, can delve into databases for information. Cyber security also focuses on equipment. Computers that are linked via electrical wire (i.e., Ethernet networks) typically have many wall jacks (”network drops“), by which computers are connected to the network.

A vacant network drop that has not been disabled can be surreptitiously used to connect with the network. Software is available that enables the connected computer to capture all data that is flowing through the network.

Wireless networks carry other security risks, as a rogue computer does not need to be physically connected to a network drop in order to acquire information. Furthermore, if the signal from a wireless network extends beyond the boundaries of a building, intelligence can be gathered even from someone parked outside.

Usernames and passwords are another vulnerable aspect of a computer network. The tendency of people to trust someone making a request for user information, and to use the same easy-to decipher identifiers repeatedly can allow an intruder to gain access to a network. Email is especially prone to breaches in security. The information in most emails, including the username, is in plain text.

Applications are available that allow email transiting from sender to receiver to be retrieved and read by a third party. Thus, an attacker can read sensitive information contained in an email and as well, can hijack an email account to send and receive messages. Emails often have documents attached to them. This route is used to deliver malicious codes (i.e., viruses, worms, Trojan Horses) to computers.

Viruses are small programs that become embedded in files. Once a file is infected, the virus can execute its function. Depending on the intent of the virus designer, the result can be merely inconvenient to extremely destructive. Thousands of viruses exist, with new ones appearing daily. Thus, viral cyber security requires constant updating of viral protection software.

Trojan Horses are applications that are disguised as useful programs. Once activated, Trojan Horses permit a remote user to have access to the host computer, via the activated program. This aspect is especially relevant in espionage and the subterfuge can be difficult to detect. Attackers sometimes utilize authorized network connections, in effect assuming the identity of the authorized user.

Another attack strategy is called man-in-the-middle. Here, a third party—the attacker or intelligence-gatherer— impersonates both ends of a connection. The real sender and receiver are unaware that their communications are not proceeding directly to the destination. A third strategy is called the replay attack. In the replay attack, transmissions are intercepted, read, and passed along to the rightful final destination.

Cyber security Measures

The perimeter security model is the most popular type of cyber security model. The defenses are set to prevent intrusion while allowing authorized user activities to proceed unimpeded. Typical perimeter defenses include firewalls (which filter incoming information according to set criteria for acceptance, such as IP address, domain name, protocol of sender-receiver communication, key words or phrases), intrusion detection systems, and virtual private network servers (where data is encrypted at the sending end and decrypted at the receiving end).

When all the components are operating properly, a perimeter defense allows only those authorized activities to proceed from the ‘outside’ (i.e., the Internet) to the individual computer or computer network. However, improperly configured perimeter de- vices can create an illusion of security while offering little security at all.

Administrative scrutiny

Data are often backed up onto tapes. Being portable, the tapes are liable to theft. If the tape data are not encrypted, the information can be transferred or copied to another computer. Another aspect of cyber security is the identification and approval of all hardware. The unapproved installation of a piece of hardware such as a modem or a firewall can compromise an entire network, if the installed item is not properly configured.

For example, an improperly configured firewall can allow access to the Internet when only receipt and transmission of email should be permitted. A dedicated systems administrator is the best guarantee of daily scrutiny of a network’s performance and vulnerability. A key component of a cyber security plan is the presence of a fallback plan in case of misadventure or deliberate sabotage.

Evaluation of the performance of some security measures is a prudent precaution. This can only be accomplished by triggering the measures by a staged attack. For example, former computer hackers are now employed by companies and government agencies to probe the vulnerabilities of a computer system. This surreptitious testing, even of the security personnel, is known as red- teaming.

Computer and network security tends to be expensive and can require additional operations on the part of the user. The installation of safeguards does not increase the operational efficiency of a computer system, and can often add more layers to the operation of the computers. Until an attack, the value of the cyber security will be invisible.

Thus, users and administrators can resist the implementation of cyber security measures. Without dedicated scrutiny, the cyber security measures that are in place can lapse over time, creating opportunities for breaching of the system.

(Author is Computer engineer and MCSE)

Domestic violence and the role of society
Artificial Intelligence and Physical Education
How Digital Innovation Is Reshaping J&K’s Socio-Economic Landscape
Emphasizing on the Role of Society in Mother Tongue Development
The Rise of the Needle-Free Facelift

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp Copy Link Print
Previous Article The Timeless virtue of Honesty
Next Article Veterinary Oversight in Slaughtering and the Imperative of Food Safety in Today’s World
Leave a Comment Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

1MFollowersLike
262kFollowersFollow
InstagramFollow
234kSubscribersSubscribe
Google NewsFollow

Latest News

The Unfinished Project of Gender Equality
Opinion
August 22, 2025
Why Silent workers Shouldn’t be Overlooked
Opinion
August 22, 2025
Veterinary Oversight in Slaughtering and the Imperative of Food Safety in Today’s World
Viewpoint
August 22, 2025
The Timeless virtue of Honesty
Viewpoint
August 22, 2025

Recent Posts

  • The Unfinished Project of Gender Equality
  • Why Silent workers Shouldn’t be Overlooked
  • Veterinary Oversight in Slaughtering and the Imperative of Food Safety in Today’s World
  • Cyber Security Measures: Protecting digital assets from cyber threats
  • The Timeless virtue of Honesty

Recent Comments

  1. Raja Mani Khan on Minor Girl Dies in J&K’s Poonch Landslide
  2. Raja Mani Khan on Srinagar: People gather in big numbers to participate in Muharram procession
  3. Shah on Relief for Employees: J&K Bank Fixes EMI-Credit Mismatch, says JK Bank Chairman
  4. Latif khan on Why Kashmir needs Stronger Private Healthcare and Health Insurance
  5. Sameer farooq mir on Qazi Irfan assumes charge as RTO Kashmir

Contact Us

Flat No 7,Press Enclave, Srinagar, 190001
0194 2477887
9971795706
[email protected]
[email protected]

Quick Link

  • E-Paper
  • About Us
  • Contact Us

Top Categories

Stay Connected

1.06MLike
262.5kFollow
InstagramFollow
234.3kSubscribe
WhatsAppFollow
Copyright © Rising Kashmir
  • Home
  • Top Stories
  • News
  • National
  • Health
  • Anchor
  • Features
  • Interview
  • Video
  • Sports
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?