Cybersecurity company
Our cybersecurity company helps you
Cybersecurity or computer security is the protection of computer systems and networks of information leakage, theft or damage, both hardware and software and data. As well as the protection against the cut or malfunction of the service that the systems provide. Many times, logical goods (intellectual data) are more valuable than physical goods. This is where the game enters information security.
Do not forget the current situation: we have a hyperconnected planet. We have left a pandemic caused by COVID-19, which has been a driver of digital transformation by bringing great benefits, but also great risks in cybersecurity and the current war.
Cybersecurity services of our company
When is a system safe?
The only safe system is one that is off and disconnected, buried in a concrete shelter, surrounded by poisonous gas and guarded by well -paid and very well armed guardians. Even so, I would not bet my life for him.
Eugene Spafford
A system like the aforementioned is safe, but it is not usable or productive. It is always necessary to find a balance between safety and functionality. Every time the level of safety of a system is increased, its productivity level is inevitably reduced.
It makes no sense that the value of our security system is much more valuable than what we want to protect. In addition, not all security decisions guarantee the protection of the system in all situations. There will always be new attacks, novel techniques and unknown vulnerabilities.
Therefore, it makes more sense to reflect on when we are insecure, that is, when we do not apply the last patches and updates, when we use weak passwords, when we download and execute Internet software, when we open email attachments of unknown senior sentences, and when we connect to unknown Wi -Fi networks.
Speaking of security: cia triad
Fundamentally, if someone wants to enter, they will enter. Okay, well. Accept it.
Director of the CIA (2006-2009) - General Michael Hayden.
We need a model that serves as a basis for establishing concepts and terminology in the field of information security .
The CIA model focuses on the confidentiality, integrity and availability of the data. This model provides a clear structure to define and discuss the fundamental aspects of security.
We could consider information security as the ability to preserve confidentiality, integrity and availability of data, together with aspects such as authenticity, reliability, traceability and non -repudiation.
CIA model
THE TRIADA CIA AND SECURITY
These concepts will allow us to talk about security problems. Example: "We lose the shipment of our only non -encrypted backup":
Do we have a confidentiality problem?
Do we have an integrity problem?
Do we have an availability problem?
Parkerian Hexad
Define the same three concepts as the Tríulo CIA but add three new concepts:
Possession or control
Physical disposition of the medium in which the data is stored.
Authenticity
Ability that allows us to discern whether the data is from a specific owner or creator. A close concept is that of non -repudiation .
I did not repudiate us to prevent a legitimate author from denoting the authorship of any type of document.
Utility
Define how useful data for us.
Types of computer security
There are several branches regarding the computer security that is demanded in a company or SME.
Computer network security
It is the computer security that is responsible for protecting the data that comes from outside the infrastructure such as those that circulate inside. Therefore, it will be in charge of analyzing the network in search of undue access, viruses, ransomware, etc.
In this computer security branch it is important to detect threats to possible cybercriminals both inside and outside the company. To do this, several alternatives are arranged within software safety such as hardware safety, which are intended for the detection and elimination of vulnerabilities.
Other tools to face cybercriminals are called firewalls not to allow undue access, private networks to ensure information or intruder prevention systems to detect those threats of improper access.
Hardware security
It is the security in charge of protecting the physical system from the infrastructure, through devices such as the best Router of Cisco and Sonicwall Network that is a hardware firewall instead of software.
All this with the objective of protecting computers, servers and devices that may be subject to alteration or subtraction of the information they contain.
Software security
Security in charge of protecting the applications and operating system of computers or from the servers themselves to external threats. Software alterations can start from connecting a pendrive, until you enter a website where you think is your usual bank.
Alternatives to this type of threats can be free or paid, but they always have the same objective, reveal the attacker and eliminate the threat. The most used tools are simple antivirus as the most sophisticated detection mechanisms, such as having a safety operational center.