Page 139 - Cyber Defense eMagazine June 2020 Edition
P. 139

manager should get capable to terminate all the external connections trying to log to his network. In such
            a case, maybe you would not be the excellent target shooter, but you would definitely get recognized as
            the outstanding trouble shooter for the cyberspace. Sometimes the web traffic is so busy and there are
            so many breach attempts, so our troubleshooter should demonstrate the strong focus and good patient
            in order to remain calm and rationally resolve any trouble being active in the asset’s network. The fact is
            even the well-trained police officer carrying on the gun could lose the control over the situation and cope
            with some kind of irrationality, so it’s not surprisingly at all for the experienced IT security professional to
            lose the battle with his impatience and push aside all his skill and logical reasoning. That can happen
            even to the most experienced cyber staff and the secret of how to stay away from such a scenario is to
            practice your mind to remain concentrated even when the things are so hard. Sometimes the hackers
            could be so annoying and you can lose your temper getting the real cyber warfare with the bad guys.
            Does not matter how hard you try to terminate them from your IT infrastructure – they would persist and
            persist. The first things you would want to do in such a case is to send everything to the hell, but that
            would lead you nowhere. You need to remain with your workstation and continue combating against
            those annoying folks that would simply want you lose control over the entire situation. In so many cases,
            if you are protecting the critical infrastructure – you would know that there is no place for the mistake.
            You just must win that war! So, your mind needs to be in the peace and you need to rule over your
            irrationalities in order to make the rational, prompt and accurate decisions on. No space for any mistake!
            You know that and at latest you are paid to be flawless. On the other hand, if situation goes outside of
            the  control  –  the  responsibility  could  be  yours,  yours  and  only  yours.  You  do  not  want  that,  right?
            Additionally, the IT security role would seek from you to be the good team player and if there is no
            accurate communications between the team’s members the bigger is change to the bad guys to obtain
            what they wanted to do.

            Assumption #9. It’s inconvenient losing your IT resources frequently.

            Explanation #9. The IT resources could be your data, software, operating system or the entire hardware
            devices. The trouble with the new generation cyber threats is that they could make your gadget getting
            broken or fully damaged. So, it’s not only about spending your time to fix your software irregularities – it’s
            more about losing your money for the entire IT infrastructure replacements. That’s so expensive and if
            it’s happening from time to time – you would figure out you would deal with the real financial losses. No
            organization  would  want  that  happens  to  so,  right?  That’s  why  there  are  some  guidelines  and
            recommendations to invest into the cyber defense within your facilities. So, the need for the competitive
            cyber security is so big and if you do not want to repair, re-install or replace all your resources and the
            other IT capacities – you should know how to prevent those occurrences even appear. Simply, it’s the
            stress to everyone in the organization to cope with such a loss and business discontinuity. There are
            some  suggestions  that  some  advanced  persistent  threats  could  make  your  hardware  getting
            malfunctioned. The fact is there are so many malware that could break your processor’s unit and in such
            a case – there is no way to fix anything – you just need to throw everything into the rubbish and buy the
            new hardware configuration on. It’s so inconvenient, right?

            Assumption #10. Cyber operations could have a psychological effect.

            Explanation #10. The greatest fear to any business is not only to lose its sensitive information, but rather
            the entire IT infrastructure. In other words, if you cope with the fear about anything you could go under





            Cyber Defense eMagazine –June 2020 Edition                                                                                                                                                                                                                         139
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   134   135   136   137   138   139   140   141   142   143   144