
Espionage: Hackers pose as US congressman
A hacker group with suspected links to the Chinese government is apparently trying to gain insight into Trump's negotiating strategy.
By Angela Köckritz
A hacker group with suspected links to the Chinese government is apparently trying to gain insight into Trump's negotiating strategy.
By Angela Köckritz
Cybersecurity is a key issue today, as advancing digitalization and networking are permeating ever larger parts of our lives. It includes the protection of networks, systems and data against unauthorized access, theft and damage. In the face of increasing threats and growing complexity, protecting this infrastructure is crucial. Read the latest cyber security news from the Table.Briefings editorial team here. What is cyber security? The definition of cyber security mainly revolves around protecting networks and computer systems from unauthorized access. It usually involves the theft of data, damage to software and hardware or the suspension of the services and functions offered. Systems and devices have become increasingly complex due to networking, cloud computing, artificial intelligence and communication with other machines and are taking up an ever greater part of our everyday lives. This infrastructure is therefore worth protecting. Why do we need cybersecurity regulations? The EU cyber strategy also includes cyber security regulations. The background to this is the dependence of critical sectors such as transport, energy, health and finance on digitalization. More and more tasks are being performed by or via computers, networks, artificial intelligence and the use of big data. At the same time, cyberattacks and cybercrime are on the rise. Cybersecurity regulation should strengthen citizens' trust in these services and increase the ability and speed of response. Cybersecurity standards should be guaranteed through certification. What cybercrime is there? The term cybercrime covers crimes that target computers, networks or their devices. In most cases, hackers are responsible for cybercrime. A distinction is made between three types. So-called white-hat hackers want to uncover security gaps and thus serve the cyber security of companies and customers. Grey-hat hackers want to enforce an extreme form of freedom of information in this way. Black hat hackers have criminal objectives and exploit security gaps in a targeted manner. There are different types of cyberattacks, the most well-known of which are black hat attacks: What cyber security policy does the EU follow? For the EU, cyber security policy is a building block in the achievement of central tasks of the international community. For the government, the cybersecurity strategy is important in order to achieve the desired structural change towards a resilient and greener Europe, which should be based on major progress in the area of digitalization. A future-oriented cybersecurity policy is necessary in order to formulate a digital leadership claim. Examples of European cybersecurity policies are the NIS Directive and the Cybersecurity Act. Only with a high level of cybersecurity can strategic autonomy be achieved and the open economy preserved. To achieve this, the various European sectors must be extremely resilient to the ever-increasing number of cyber attacks. The government also considers it a core task of its cyber security policy to ensure that all citizens and companies have confidence in the digital tools and can and want to make full use of the services. How is the cyber security threat situation developing? The threat situation in cyber security is developing rapidly, driven by technological advances and increasing networking. One significant trend is the increase in ransomware attacks, in which cyber criminals encrypt data and demand a ransom. These attacks are becoming increasingly sophisticated, often with targeted attacks on critical infrastructure such as healthcare and energy supplies. Another trend is the growing threat of supply chain attacks, where hackers exploit vulnerabilities in the supply chains of large companies to gain access to sensitive data. Attacks on the Internet of Things (IoT) are also on the rise, as more and more devices are being networked and are often inadequately secured. Cybercrime is increasingly being amplified by the use of artificial intelligence (AI) and machine learning. Cybercriminals are using AI to circumvent security measures and automate attacks, while at the same time defenders are using these technologies to detect and fend off threats at an early stage. In addition, the increasing number of state-sponsored cyber attacks represents a growing danger, as these are often highly specialized and difficult to defend against. Overall, the dynamic threat situation requires continuous adaptation and innovation in cyber security. How can private individuals improve their personal cyber security? Individuals can significantly improve their cyber security through simple but effective measures. The first step is to use strong, unique passwords for each account, ideally managed by a password manager. Enabling two-factor authentication (2FA) provides additional protection by requiring a second confirmation step in addition to the password. Regular software updates are also essential as they close security gaps. Caution is required when opening emails and attachments to avoid phishing attacks. Reliable antivirus and anti-malware software protects against malicious programs and should be updated regularly. The use of secure networks is another important aspect; public WLANs should be avoided or only used with a VPN. Regular backups of important data protect against data loss due to cyber attacks. Conscious handling of personal information, especially in social networks, reduces the risk of identity theft. Finally, it is important to stay informed about current cyber threats and practice safe online behavior, e.g. by only downloading software from trusted sources. These measures go a long way towards strengthening personal cyber security and minimizing the risk of cybercrime.