Page 139 - Cyber Defense eMagazine June 2020 Edition
P. 139
manager should get capable to terminate all the external connections trying to log to his network. In such
a case, maybe you would not be the excellent target shooter, but you would definitely get recognized as
the outstanding trouble shooter for the cyberspace. Sometimes the web traffic is so busy and there are
so many breach attempts, so our troubleshooter should demonstrate the strong focus and good patient
in order to remain calm and rationally resolve any trouble being active in the asset’s network. The fact is
even the well-trained police officer carrying on the gun could lose the control over the situation and cope
with some kind of irrationality, so it’s not surprisingly at all for the experienced IT security professional to
lose the battle with his impatience and push aside all his skill and logical reasoning. That can happen
even to the most experienced cyber staff and the secret of how to stay away from such a scenario is to
practice your mind to remain concentrated even when the things are so hard. Sometimes the hackers
could be so annoying and you can lose your temper getting the real cyber warfare with the bad guys.
Does not matter how hard you try to terminate them from your IT infrastructure – they would persist and
persist. The first things you would want to do in such a case is to send everything to the hell, but that
would lead you nowhere. You need to remain with your workstation and continue combating against
those annoying folks that would simply want you lose control over the entire situation. In so many cases,
if you are protecting the critical infrastructure – you would know that there is no place for the mistake.
You just must win that war! So, your mind needs to be in the peace and you need to rule over your
irrationalities in order to make the rational, prompt and accurate decisions on. No space for any mistake!
You know that and at latest you are paid to be flawless. On the other hand, if situation goes outside of
the control – the responsibility could be yours, yours and only yours. You do not want that, right?
Additionally, the IT security role would seek from you to be the good team player and if there is no
accurate communications between the team’s members the bigger is change to the bad guys to obtain
what they wanted to do.
Assumption #9. It’s inconvenient losing your IT resources frequently.
Explanation #9. The IT resources could be your data, software, operating system or the entire hardware
devices. The trouble with the new generation cyber threats is that they could make your gadget getting
broken or fully damaged. So, it’s not only about spending your time to fix your software irregularities – it’s
more about losing your money for the entire IT infrastructure replacements. That’s so expensive and if
it’s happening from time to time – you would figure out you would deal with the real financial losses. No
organization would want that happens to so, right? That’s why there are some guidelines and
recommendations to invest into the cyber defense within your facilities. So, the need for the competitive
cyber security is so big and if you do not want to repair, re-install or replace all your resources and the
other IT capacities – you should know how to prevent those occurrences even appear. Simply, it’s the
stress to everyone in the organization to cope with such a loss and business discontinuity. There are
some suggestions that some advanced persistent threats could make your hardware getting
malfunctioned. The fact is there are so many malware that could break your processor’s unit and in such
a case – there is no way to fix anything – you just need to throw everything into the rubbish and buy the
new hardware configuration on. It’s so inconvenient, right?
Assumption #10. Cyber operations could have a psychological effect.
Explanation #10. The greatest fear to any business is not only to lose its sensitive information, but rather
the entire IT infrastructure. In other words, if you cope with the fear about anything you could go under
Cyber Defense eMagazine –June 2020 Edition 139
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.