Back

Methods to detect and prevent cyber security threats

Introduction
There are a number of measures organisations typically put in place to detect and prevent cyber security threats.

FingerprintPhysical and biometric security measures
Employees in an organisation are seen as the weak point in whatever security systems are in place so organisations engineer a range of measures to try and reduce the likelihood of these kinds of attacks occurring. For example, employees can be issued with Pass Cards. These have to be swiped, sometimes in conjunction with having to enter a Personal Identification Number (PIN) to open certain doors to rooms holding equipment or to access a computer system. Biometric scans can be used as an alternative to Pass Cards, which can be lost, damaged or stolen. Biometric scanning involves scanning a unique part of a person, who wants to get access to a particular area or access a resource, typically their fingerprint or retina. The scan is then compared to a database of the biometric data of employees, who have been through an authorisation process. Biometric measures are not always reliable. People sometimes have to scan their finger or retina a number of times before they are authenticated. However, you will always have your fingers and eyes ready to use with you at all times! You can't lose them or have them stolen like Pass Cards.

Password systems and two-step verification
Many computer systems require a user to enter a password to authenticate themselves. It is important to follow good password practice with these kinds of systems, as detailed here. A relatively recent innovation makes use of the fact that most people carry a mobile phone with them now. When you want access to a system, you enter in a password. Then, the system detects you are trying to get access and sends you a one-time security code, usually by text message to your mobile phone but other forms can be used, such as a voice message by phone or by email. The code is can only be used once and is valid for only a few minutes. You then have to enter this code into the system to finally get access.

CaptchaCAPTCHA
This is a security program running on a system, which is used to distinguish between humans and programs written to automatically log on. They are used to prevent automated log-ins, spam and attempts to automatically get data from websites.

The user typically has to enter one or two words or a code that has been distorted on a screen. Other methods include asking a question, which would be difficult for a computer program to work out but easy for a person. It might ask, for example, what colour the sun was, and a user would have to enter in 'yellow'. Another system might present you with six pictures and ask you to select the pictures which have trees in.

Email verification
Sometimes, especially when you set-up a new account online, you have to confirm your identity. After you have entered in your details, or after you try to log in, an email with a link is sent to the email address you gave in your account details. You then have to click on the link to confirm you are the owner of the account. One advantage of this is that is stops somebody setting up a new account who uses your email address in the process. If someone tries to set up a new account with a website, using your email address, it won't get activiated because the website will send an email to your email address, asking you to confirm this is you. The person trying to set up the account won't get the email to confirm the account is genuine.

hackerAutomatic software updates
Hackers are constantly trying to find ways to hack into your computer or computer system. They will probe for weaknesses in any software you have installed. Operating systems and many applications usually have a setting that allows you to download and install automatically any security patches that are released. A patch is a piece of software designed to fix any problems found in an application. Many people forget the importance of keeping their software up-to-date and fully patched, especially with the latest security releases. Automatically allowing the operating system and applications to do this for you is one way around this problem.

Back