Cyber Security is a real necessity that we all need to understand and practice. In this article we will define Cyber Security. In future articles, we’ll discuss how the San Antonio economy will benefit from being known as “Cyber City USA”.
San Antonio has different monikers and known by several names and industries. San Antonio has been called the Military City or the Alamo City and brought in visitors from all over for its tourism and the famous, historic missions. Because of USAA, some would even regard San Antonio as experts in the financial and insurance arena.
San Antonio is quickly becoming the industry leader in Cyber Security.
Very few outside the computer security industry ever thought San Antonio would excel in this arena. But for those in the industry, it is easy to understand how this new industry is becoming so important to San Antonio — As San Antonio is second in the nation only to Washington DC in Information Security and second only to California in Cyber Security.
Cyber Security is one of the few industries which will regularly cross between the Military, Government and Private sectors. With the new addition of 24th Air Force Command at Lackland Air Force Base this year. It is no wonder this important industry has arrived in our very own San Antonio!
It seems that everything relies on computers and the internet now. Communication (email, cell phones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. Just think, “How much of your daily life relies on computers?” “How much of your personal information is stored either on your own computer or on someone else’s system?”
What is Cyber Security? This process involves protecting that information by preventing, detecting, and responding to attacks.
In recent months, the media has been reporting different organizations and even countries have been “attacking” and hacking into different data-bases. These data-bases contain everything from a financial institutions’ “secret sauce”, to government related operating procedures and strategies. Such large databases can even include individuals like you and my personal information.
In past years the procedure was to turn-off the computer to stop an attack. Out of necessity, this strategy had to change. Think about it, the government cannot just turn off its entire network every time it is hacked. Do you want your bank to shut down all its ATM’s every time they’re hacked? No.
Time for a new strategy! Cyber Security!
Now we are able to identify the breach and isolate it from expanding in such large and important network systems. Of course, protecting against the hacking and attacking has to be accomplished while maintaining the original mission or task of the institution or system. Not to mention, we would also like to find the perpetrators and bring them to justice.
Could hacking be considered an act of terrorism? Yes, if the right system such as our power grid is attacked, how could it not be an act of Terrorism? If your bank account or your personal information is stolen, I guarantee you will feel it’s more than a criminal matter.
Practicing Cyber Security is all our responsibility and must not be taken lightly.