Personal tools

Active Security Protection

World Trade Center_090122A
[Never Forget. 09-11-2001]


- Overview

Cybersecurity is the practice of protecting internet-connected devices and services from cybercriminals, hackers, and spammers. Companies use cybersecurity to protect against: Phishing schemes, Ransomware attacks, Identity theft, Data breaches, Financial losses. 

Some types of cybersecurity include:

  • Application security
  • Cloud security
  • Critical infrastructure security
  • Data security
  • Endpoint security
  • IoT (Internet of Things) security
  • Mobile security
  • Network security


The traditional method of protecting computer systems involves the deployment of prevention mechanisms, such as anti-virus software. As attackers become more sophisticated, the effectiveness of protection mechanisms decreases as the cost increases. 

However, a new generation of security mechanisms is emerging that uses an active approach, such as hooks that can be activated when new types of attacks are exposed and machine-learning mechanisms to identify sophisticated attacks. Attacking the attacker is a technological possibility as well, but is almost always illegal.


- Active Cyber Defense

Active security protection, also known as proactive cybersecurity, is a proactive approach to defending against cyber attacks. It involves identifying security gaps and searching for threats before a breach occurs. 

Here are some tips for maintaining cybersecurity:

  • Use strong, complex passwords
  • Keep software up to date
  • Use anti-virus protection
  • Use two-factor or multi-factor authentication
  • Access control to data and systems
  • Put up a firewall
  • Use VPNs on public Wi-Fi networks
  • Install antivirus software on devices
  • Use identity theft protection services
  • Use secure passwords by checking them with a password strength checker
  • Don't jailbreak your phone if you have an Android

[More to come ...]



Document Actions