homeappliancesbrands
  • Home
  • blog
  • privacy policy
  • about us
  • English
    • English
    • Japanese
  • Home
  • /
  • Article
  • /
  • Security Information for...

Security Information for Safe Digital Utilization from Canon MJ Cyber ​​Security Information Bureau ESET What is Cyber ​​Attack Surface? How to mitigate that risk?


In recent information leakage accidents, many people may have heard words such as "cyber attack surface (area with high possibility of being attacked by cyber)" and similar words. It's important to understand how cyberattacks occur and where the risks are in your organization. In this pandemic, this attack surface has expanded rapidly at an unprecedented speed. And unfortunately, today companies are unable to identify where and how complex they are likely to be attacked. As a result, digital and physical assets are left unattended, leaving room for cybercriminals to attack.

Fortunately, however, the best practices listed below are likely to improve the visibility of the attack surface. Visualization will allow us to take the necessary steps to minimize the attack surface and manage it properly.

What is an attack surface?

Simply put, an attack surface is a company's physical and digital assets that can be compromised to facilitate cyberattacks. Attackers have a wide range of purposes, including spreading ransomware, stealing data, forming botnets, downloading banking Trojan horses, and installing cryptocurrency mining malware, but ultimately aim to expand the target of attacks. .. In other words, the larger the attack target, the wider the attacker's target range.

Attack surfaces are broadly divided into two categories.

Digital attack surface

Includes networked hardware, software, and all other components.

Applications: Application vulnerabilities are common and attackers can be a valid entry point into critical information systems and data.

キヤノンMJがお届けする安全なデジタル活用のためのセキュリティ情報 サイバーセキュリティ情報局 ESET サイバーアタックサーフェスとは何か。そのリスクを軽減する方法とは?

Code: Code compiled by a third party poses a great risk because it may contain malware and vulnerabilities.

Ports: Attackers are hunting for open ports or services using specific ports. For example, TCP port 3389 used for RDP (Remote Desktop Protocol) can be targeted. These services can be abused if they are not properly configured or contain bugs.

Server: Can be the target of exploit-based vulnerability attacks and DDoS attacks.

Website: Elements such as code flaws and misconfigurations in the website are also included in the digital attack surface. Malicious code can be embedded, such as site tampering or formjacking.

Certificates: Many companies leave their certificates revoked and can be abused by attackers.

These do not cover all of the attack surfaces. The following is a summary of the survey conducted on FTSE30 companies in 2020 to show the rapid expansion of the digital attack surface.

Physical attack surface

Includes all terminals that an attacker can physically access.

Employees can also be said to be the main parties to the physical attack. That's because there is a risk of being guided by social engineering in the process of cyber attacks, including phishing scams and their variants. Some employees also do shadow IT, such as escaping corporate security controls and using unauthorized applications and devices. Unapproved tools often expose companies to new threats because they are not well protected.

Is the attack surface expanding?

Companies have been building IT infrastructure and digital assets for many years. However, pandemics have made significant investments to support remote work and maintain business in a dramatically changing business environment. Therefore, the attack surface is also expanding. The following is an example.

This trend will continue in the future. Experts say that many companies have reached a turning point in digitalization, where business practices will change permanently. These changes carry the following risks.

Moreover, the risk of attack surface expansion is not limited to the above. In fact, there are hundreds of attacker techniques, some of which are highly diffuse. For example, ESET discovered 71 billion attacks that broke RDP misconfiguration between January 2020 and June 2021.

To reduce the risk of attack surfaces

It's important to follow cybersecurity best practices when dealing with growing attack surfaces. The first step is to understand the scope and take measures to mitigate and manage it. Here are some hints.

The corporate IT environment is constantly changing. Specifically, it includes the spread of virtual machines and containers, microservices, employee hiring and leaving, and the introduction of new hardware and software. Therefore, in order to visualize and manage the state of the attack surface, a flexible and advanced tool that can make decisions based on real-time information is required. To mitigate the risk of attack surfaces, you should focus on "visibility and control" as well as other security measures.


25 / Apr / 2022 homeappliancesbrands

Navigation Lists

What is an attack surface? Digital attack surface Physical attack surface Is the attack surface expanding? To reduce the risk of attack surfaces

Category

blog

Related Articles

10.Apr.2023

New features for Google accounts, such as "Change password with one tap"

Google has announced a new feature to improve the security of your Google account with the aim of enhancing privacy protection on the 18th local time. "Quick Delete" "Locked Folder" new...

09.Apr.2023

Starting March 2021! What are the benefits of Docomo's new rate "ahamo"? Check with [5 points]

In December 2020, NTT Docomo announced a new rate plan for smartphones, "ahamo." "ahamo" website (Source: ahamo) What is ahamo, which appeared amid rumors of "smartphone price cuts"?

08.Apr.2023

Reasons why Hitachi introduced SD-WAN - Deployment to 2,800 bases in 2-3 years

SD-WAN stands for Software Defined WAN, a WAN controlled by software. With SD-WAN, an SD-WAN router is installed at each site, and a virtual network is created on a physical line such as a leased line, ISDN, or Internet line...

07.Apr.2023

5G compatible home router "Speed ​​Wi-Fi HOME" new product, released in early November

"Speed ​​Wi-Fi HOME 5G L12" is a home router that allows you to connect to the Internet simply by inserting a SIM card and connecting it to an outlet at home. A new product following au's first 5G compatible home router "Speed ​​Wi-Fi HOME 5G L11" released in August ...

Hot Articles

EVsmart blog Toyota's electric car "bZ4X" that makes you feel comfortable with electric cars and quick chargers / No% display of battery level [Editorial department] Popular articles Recent posts Category

EVsmart blog Toyota's electric car "bZ4X" that makes you feel comfortable with electric cars and quick chargers / No% display of battery level [Editorial department] Popular articles Recent posts Category

23.Apr.2022
 Lenovo's 8.8 inch one-handed tab "Legion Y700" full specs released!  [Is the price in the 40,000 yen range?]

Lenovo's 8.8 inch one-handed tab "Legion Y700" full specs released! [Is the price in the 40,000 yen range?]

01.May.2022
# Remote desktop from the beginning-Connecting to your home computer from outside (IPv4)

# Remote desktop from the beginning-Connecting to your home computer from outside (IPv4)

28.Apr.2022
What is the mechanism of "universal control" that enables direct cooperation just by arranging Mac and iPad side by side?

What is the mechanism of "universal control" that enables direct cooperation just by arranging Mac and iPad side by side?

30.Mar.2022

Tags

How to configure your router to use wpa2

Copyright © 2023 homeappliancesbrands.com. All rights reserved.