Becoming cyber-aware: Know your threat surface

It is important that Canadians be cyber-aware in our personal and professional lives. We depend on networked devices every day for activities ranging from personal entertainment and communication to conducting business domestically and internationally. While the Internet provides us with these capabilities and resources, it also exposes our devices and our information to a variety of threats.

Understanding “Cyber Threats” and “Threat Surface”

Cyber threats can sound more complicated than they are, hiding behind terms like “advanced persistent threat,” “Zero-Day,” or other jargon. It is important to clarify the concepts because, in truth, cyber threats don’t have to be advanced or persistent; cyber threats can be as simple as answering our email or clicking on a link. Before we can identify what cyber threats are, we need to ask two questions:

  1. What do we have that someone might want?
  2. How can someone access or damage those assets?

The first question is relatively easy to answer, and we can immediately think of our finances, usernames and passwords for online accounts, and other personal information like social insurance numbers.

The second question can be more difficult to answer. In cyber security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. , we refer to “threat actors:” those who try to take our data. Our “threat surface” refers to the ways that a threat actor can access our data, or assets, without our permission.

Threat actors use the internet to conduct malicious activity. This activity ranges from stealing our data to compromising our networks and damaging our devices. Threat actors can be individuals or groups, and they can have a wide range of sophistication and capability.

Threat surface is made up of two general categories: the users and the technology. Users are; anyone with hands on a keyboard or a device who can be exploited by a threat actor, much like an Internet-connected device can. One of the most common techniques that the Cyber Centre sees is phishing PhishingAn attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information, which they may then use to commit fraudulent acts. . Phishing is a technique in which the threat actor entices a user to click on links to malicious websites, or download malware MalwareMalicious software designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. onto our devices.

Threat actors can exploit vulnerabilities in technology as a way of gaining unauthorized access to data and systems.

On a small scale, technology can be as simple as a personal laptop or smart phone. On a larger scale, in the case of a business or the Government of Canada, technology can include devices such as workstations, servers, and printers. Even Internet of Things technology like thermostats, fridges, and lights can be part of the threat surface.

Are we really vulnerable?

Our data and devices have value to us and others. Services like online banking have made financial management more convenient, but it has also expanded our potential threat surface. Personal information like credit card numbers, usernames and passwords, social insurance numbers, and email addresses can be bought, sold, or posted online. Even the processing power of our devices can be used by threat actors in activities such as botnets, denial-of-service attacks, or for financial gain.

As we network more of our devices, we also expand our threat surface. With the rapid pace of digitization and technological improvement, we all need to increase our cyber awareness. That’s where the Cyber Centre comes in, with advice and guidance to help you reduce your threat surface. Find out more on our Cyber Hygiene page.

 

 

Date modified: