{"id":4778,"date":"2017-04-12T14:33:10","date_gmt":"2017-04-12T12:33:10","guid":{"rendered":"https:\/\/www.polyas.de\/blog\/?p=4778"},"modified":"2017-04-12T14:34:29","modified_gmt":"2017-04-12T12:34:29","slug":"cyber-security-definitions-part-1","status":"publish","type":"post","link":"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1","title":{"rendered":"Cyber Security Definitions: Part One &#8211; the Basics"},"content":{"rendered":"<p>Cyber security\u00a0is becoming more and more important in the globalized world. Since everything is connected, IT security should, and often is, a central focus for companies, organizations and private individuals.<!--more--><\/p>\n<p>The internet can be intimidating and even sometimes dangerous. There are a variety of threats which should be clarified\u00a0in this, the first part of our cybersecurity definitions post.<\/p>\n<h3><strong>Denial of service attacks (DoS-attacks)<\/strong><\/h3>\n<p>In computing, denial of service attacks (DoS-attacks) describes a cyber-attack whose goal it is to disrupt web services. DoS-attacks are usually accomplished by flooding the targeted host or server with millions of inquiries, emails or data. This results in an overloaded system and the web service can no longer fulfill legitimate requests.<\/p>\n<p>\u2192 <em>A real life example would be a group of people crowding the door of the post office so that legitimate customers can no longer enter and do their business. <\/em><\/p>\n<p>DoS-attacks typically do not want to enter a network, system or data but limit or block a web service or make it useless. There is a variety of DoS-attacks like Distributed Denial of Service (DDoS), Distributed Reflective Denial of Service (DRDoS) and Advanced Persistent Denial of Service (APDoS).<\/p>\n<h3><strong>Phishing<\/strong><\/h3>\n<p>Phishing is a technique which is used \u201cto fish\u201d for passwords or usernames. Its most common use is to illegally obtain credit card details or other personal banking details to make financial transactions.<\/p>\n<p>Perpetrators often create similar looking online banking websites. Then they randomly sent emails with a link to the fake website. Customers are asked to fill out a form with their banking details because of security or bank internal reasons. That is how the perpetrators receive what they need to make transactions in the name of the customer.<\/p>\n<p>You can enhance your cyber security through being a bit tech-savvier &#8211; don&#8217;t click on anything in an email from an unknown sender. Indeed, even if someone you know sends you a suspicious link &#8211; use caution. If you get a message saying someone has used your account to buy items from Amazon &#8211; log into your account separately to check instead.<\/p>\n<h3><strong>Brute force attacks\u00a0<\/strong><\/h3>\n<p>A brute force attack is a problem-solving method in computer science, cryptanalysis and game theory. Confused? In essence, it is a repeated attempt to guess passwords and details to gain access to data. It is also known as exhaustive search,\u00a0the brute force program systematically tries out different numbers, letters, and spaces to crack algorithms, log in details and passwords.<\/p>\n<p>This method is often illegally used to unlock encrypted files, information, messages or passwords. The longer the key the longer it takes to unlock the encrypted data. For example, a 32-bit-key in a regular computer has four billion possibilities, which can be tried out in minutes. In contrast to 128-bit-keys where it would take several thousand years to crack the code.<\/p>\n<p>to enhance your cyber security, make longer, more complicated passwords. Similarly, \u00a0don&#8217;t become annoyed if you get locked out when you have guessed your password incorrectly one too many times&#8230; It&#8217;s for your protection.<\/p>\n<h3>Backdoors<\/h3>\n<p>Backdoors allow unauthorized access to computers and data. As the name suggests, the perpetrator gains access through the back door. A hidden, constantly running program often offers unlimited access to the computer. In contrast to Trojans, backdoors allow direct access to the computer and personal data. It is also possible to manipulate hard- and software, destroy data or install malware and viruses on the computer.<\/p>\n<p>We will be posting the second part of our cyber security definitions next week!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security\u00a0is becoming more and more important in the globalized world. Since everything is connected, IT security should, and often is, a central focus for companies, organizations and private individuals.<\/p>\n","protected":false},"author":268,"featured_media":4792,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","ub_ctt_via":"","spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[1],"tags":[],"featured_image_src":"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/04\/DDoS-Attacken.jpg","author_info":{"display_name":"Jaqueline Bargmann","author_link":"https:\/\/www.polyas.de\/blog\/author\/j-bargmann"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber security definitions in the modern and globalized world<\/title>\n<meta name=\"description\" content=\"A lack of cyber security opens up opportunities for perpetrators to illegally obtain your information. Read more about modern cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber security definitions in the modern and globalized world\" \/>\n<meta property=\"og:description\" content=\"A lack of cyber security opens up opportunities for perpetrators to illegally obtain your information. Read more about modern cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1\" \/>\n<meta property=\"og:site_name\" content=\"POLYAS\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-12T12:33:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-12T12:34:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/04\/DDoS-Attacken.jpg?fit=860%2C340&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jaqueline Bargmann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jaqueline Bargmann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1\",\"url\":\"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1\",\"name\":\"Cyber security definitions in the modern and globalized world\",\"isPartOf\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/#website\"},\"datePublished\":\"2017-04-12T12:33:10+00:00\",\"dateModified\":\"2017-04-12T12:34:29+00:00\",\"author\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/8cbe396ee30a3d334a551fa2d84f36c4\"},\"description\":\"A lack of cyber security opens up opportunities for perpetrators to illegally obtain your information. Read more about modern cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.polyas.de\/blog\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Definitions: Part One &#8211; the Basics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#website\",\"url\":\"https:\/\/www.polyas.de\/blog\/\",\"name\":\"POLYAS\",\"description\":\"the blog for secure online voting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.polyas.de\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/8cbe396ee30a3d334a551fa2d84f36c4\",\"name\":\"Jaqueline Bargmann\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/df256ee9f7c410d651ebbf540a8065b4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/df256ee9f7c410d651ebbf540a8065b4?s=96&d=mm&r=g\",\"caption\":\"Jaqueline Bargmann\"},\"sameAs\":[\"http:\/\/www.polyas.de\"],\"url\":\"https:\/\/www.polyas.de\/blog\/author\/j-bargmann\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber security definitions in the modern and globalized world","description":"A lack of cyber security opens up opportunities for perpetrators to illegally obtain your information. Read more about modern cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1","og_locale":"de_DE","og_type":"article","og_title":"Cyber security definitions in the modern and globalized world","og_description":"A lack of cyber security opens up opportunities for perpetrators to illegally obtain your information. Read more about modern cyber threats.","og_url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1","og_site_name":"POLYAS","article_published_time":"2017-04-12T12:33:10+00:00","article_modified_time":"2017-04-12T12:34:29+00:00","og_image":[{"width":860,"height":340,"url":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/04\/DDoS-Attacken.jpg?fit=860%2C340&ssl=1","type":"image\/jpeg"}],"author":"Jaqueline Bargmann","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Jaqueline Bargmann","Gesch\u00e4tzte Lesezeit":"3 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1","url":"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1","name":"Cyber security definitions in the modern and globalized world","isPartOf":{"@id":"https:\/\/www.polyas.de\/blog\/#website"},"datePublished":"2017-04-12T12:33:10+00:00","dateModified":"2017-04-12T12:34:29+00:00","author":{"@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/8cbe396ee30a3d334a551fa2d84f36c4"},"description":"A lack of cyber security opens up opportunities for perpetrators to illegally obtain your information. Read more about modern cyber threats.","breadcrumb":{"@id":"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.polyas.de\/blog\/en\/polyas\/cyber-security-definitions-part-1#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.polyas.de\/blog\/de"},{"@type":"ListItem","position":2,"name":"Cyber Security Definitions: Part One &#8211; the Basics"}]},{"@type":"WebSite","@id":"https:\/\/www.polyas.de\/blog\/#website","url":"https:\/\/www.polyas.de\/blog\/","name":"POLYAS","description":"the blog for secure online voting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.polyas.de\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/8cbe396ee30a3d334a551fa2d84f36c4","name":"Jaqueline Bargmann","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.polyas.de\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/df256ee9f7c410d651ebbf540a8065b4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/df256ee9f7c410d651ebbf540a8065b4?s=96&d=mm&r=g","caption":"Jaqueline Bargmann"},"sameAs":["http:\/\/www.polyas.de"],"url":"https:\/\/www.polyas.de\/blog\/author\/j-bargmann"}]}},"jetpack_featured_media_url":"https:\/\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/04\/DDoS-Attacken.jpg","jetpack_publicize_connections":[],"jetpack_shortlink":"https:\/\/wp.me\/p72Pnr-1f4","jetpack-related-posts":[{"id":3720,"url":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/dangerous-router-ddos-attacks-internet-things","url_meta":{"origin":4778,"position":0},"title":"Dangerous Router: DDoS-Attacks in the Age of Internet of Things","date":"30\/11\/2016","format":false,"excerpt":"Many Telekom customers in Germany had to live without internet and telephone on the weekend. Hackers tried to install malware on 900,000 routers and integrate them into a botnet. Presumably to carry out DDoS-attacks. Fortunately, this did not work out thanks to a badly programmed software. However, DDoS-attacks with web-enabled\u2026","rel":"","context":"In &quot;IT Security&quot;","img":{"alt_text":"DDoS-Angriffe Pr\u00e4vention und Funktionsweise","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2016\/11\/DDoS-Attacken.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5268,"url":"https:\/\/www.polyas.de\/blog\/en\/electoral-research\/alleged-russian-interference-how-did-they-do-it","url_meta":{"origin":4778,"position":1},"title":"Alleged Russian Interference &#8211; How did they do it and did it work?","date":"29\/06\/2017","format":false,"excerpt":"Meddling in foreign elections is a major topic as investigations continue into potential Russian interference in the 2016 US election and collusion with the Trump campaign. In this edition of our blog series on foreign election interference, we look at the allegations made against Russia. In December 2016, outgoing President\u2026","rel":"","context":"In &quot;Electoral research&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9198,"url":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/it-security-for-virtual-voting-expert-interview","url_meta":{"origin":4778,"position":2},"title":"IT security for virtual voting &#8211; Expert interview","date":"16\/06\/2021","format":false,"excerpt":"At the latest with the occurrence of corona, the question of IT security in virtual voting has become even more important. We are repeatedly being asked how we protect the data of eligible voters and improve the security of voting. So we put the question to somebody who should know:\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"IT security","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/06\/IT-Security.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":9596,"url":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/bsi-certificate","url_meta":{"origin":4778,"position":3},"title":"Fact check: BSI certificate for online elections","date":"03\/11\/2021","format":false,"excerpt":"On June 25, 2021, the POLYAS CORE 2.5.0 was once again certified according to the international Common Criteria standards. We took this opportunity to fact-check the frequently asked questions concerning the BSI certificate (BSI = German Federal Office for Information Security). What does the BSI certificate mean? What exactly is\u2026","rel":"","context":"In &quot;About POLYAS&quot;","img":{"alt_text":"BSI-Certificate-online-voting","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2021\/08\/BSI-Certificate-online-voting.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":4983,"url":"https:\/\/www.polyas.de\/blog\/en\/digital-democracy\/digital-participation-advantages-disadvantages","url_meta":{"origin":4778,"position":4},"title":"Digital Participation &#8211; the Advantages and Disadvantages","date":"10\/05\/2017","format":false,"excerpt":"In the previous installments of this series, we have covered some of the different forms of digital participation. Today we will be assessing the overall benefits and drawbacks of participating in a digital world.\u00a0 The Advantages of Digital Participation The main goal of online democracy is the strengthened integration of\u2026","rel":"","context":"In &quot;Digital Democracy&quot;","img":{"alt_text":"Digital Participation","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/05\/Digital-Participation.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5952,"url":"https:\/\/www.polyas.de\/blog\/en\/online-elections\/security\/eu-data-protection-regulations","url_meta":{"origin":4778,"position":5},"title":"New EU-Data Protection Regulations &#8211; What you need to know for 2018","date":"15\/11\/2017","format":false,"excerpt":"In just half a year new data protection regulations are coming into effect. This new set of legislation will be enshrined into EU law on the 25th of May 2018. They are aimed at giving more control to Internet users over their personal data. Altering the data protection regulations will\u2026","rel":"","context":"In &quot;IT Security&quot;","img":{"alt_text":"New EU Data Protection Regulations to be implemented in May 2018","src":"https:\/\/i0.wp.com\/www.polyas.de\/blog\/wp-content\/uploads\/2017\/11\/Data-Protection-Regulations.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/4778"}],"collection":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/users\/268"}],"replies":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/comments?post=4778"}],"version-history":[{"count":3,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/4778\/revisions"}],"predecessor-version":[{"id":4794,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/posts\/4778\/revisions\/4794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/media\/4792"}],"wp:attachment":[{"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/media?parent=4778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/categories?post=4778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.polyas.de\/blog\/wp-json\/wp\/v2\/tags?post=4778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}