{"id":7088,"date":"2022-04-11T15:55:44","date_gmt":"2022-04-11T12:55:44","guid":{"rendered":"https:\/\/cyberlevins.com\/?p=7088"},"modified":"2022-04-11T15:55:44","modified_gmt":"2022-04-11T12:55:44","slug":"arta-razboiului-cibernetic","status":"publish","type":"post","link":"https:\/\/cyberlevins.com\/ro\/arta-razboiului-cibernetic","title":{"rendered":"Arta R\u0103zboiului Cibernetic"},"content":{"rendered":"<p>Cunoa\u0219terea inamicului:<\/p>\n<p>&#8222;DAC\u0102 \u00ce\u021aI CUNO\u0218TI INAMICUL \u0218I TE CUNO\u0218TI \u0218I PE TINE \u00ceNSU\u021aI, NU TREBUIE S\u0102 TE TEMI DE REZULTATUL A O SUT\u0102 DE B\u0102T\u0102LII. DAC\u0102 TE CUNO\u0218TI PE TINE \u00ceNSU\u021aI, DAR NU \u0218I INAMICUL, PENTRU FIECARE VICTORIE OB\u021aINUT\u0102 VEI SUFERI \u0218I O \u00ceNFR\u00c2NGERE. DAC\u0102 NU-\u021aI CUNO\u0218TI NICI DU\u0218MANUL, NICI PE TINE \u00ceNSU\u021aI, VEI SUCOMBA \u00ceN FIECARE B\u0102T\u0102LIE.&#8221;<\/p>\n<p>SUN TZU, ARTA R\u0102ZBOIULUI<\/p>\n<p>Poate c\u0103 este un citat din secolul al V-lea \u00ee.Hr., \u00eens\u0103 continu\u0103 s\u0103 fie valabil \u0219i ast\u0103zi. A sosit timpul s\u0103 abord\u0103m corect problema \u0219i s\u0103 ne cunoa\u0219tem inamicul.<\/p>\n<p>R\u0103zboiul cibernetic are consecin\u021be grave, iar organiza\u021biile trebuie s\u0103 fie preg\u0103tite s\u0103 contracareze atacurile.<\/p>\n<h4><strong>S\u0103 fii preg\u0103tit corespunz\u0103tor <\/strong><\/h4>\n<p>Din p\u0103cate, criminalitatea informatic\u0103 devine o realitate. Constituie o \u00eendeletnicire extrem de profitabil\u0103 \u0219i, pe m\u0103sur\u0103 ce infractorii continu\u0103 s\u0103 for\u021beze victimele s\u0103 pl\u0103teasc\u0103 r\u0103scump\u0103r\u0103ri, ciclul de afaceri continu\u0103, ceea ce \u00eenseamn\u0103 c\u0103 tot mai multe companii vor fi atacate \u00een mod inevitabil. Ignoran\u021ba nu este acceptabil\u0103 \u00een 2022, iar protec\u021bia datelor ar trebui s\u0103 fie \u00eembun\u0103t\u0103\u021bit\u0103 semnificativ.<\/p>\n<p>Trat\u00e2nd securitatea cibernetic\u0103 ca pe un centru de cost \u0219i investind \u00een informa\u021bii, organiza\u021biile pot evita cheltuielile de remediere mult mai costisitoare \u0219i daune de reputa\u021bie \u00een aval. Cu c\u00e2t se investe\u0219te mai mult timp \u0219i bani \u00een protec\u021bia datelor aici \u0219i acum, cu at\u00e2t mai mic este riscul ca o companie s\u0103 fie atacat\u0103 \u00een aval.<\/p>\n<p>De\u0219i atacurile \u0219i amenin\u021b\u0103rile cibernetice reprezint\u0103 o lupt\u0103 continu\u0103, acestea pot fi prevenite prin cunoa\u0219terea diferitelor tipuri de protocoale, exploat\u0103ri, instrumente \u0219i resurse utilizate de actorii r\u0103u inten\u021biona\u021bi. \u00cen plus, \u0219tiind unde \u0219i cum s\u0103 v\u0103 a\u0219tepta\u021bi la atacuri, se asigur\u0103 crearea unor m\u0103suri preventive eficiente pentru a v\u0103 proteja sistemele.<\/p>\n<h4><strong>Prevenirea este cea mai bun\u0103 ap\u0103rare \u00een materie de securitate cibernetic\u0103 <\/strong><\/h4>\n<p>De\u0219i este solu\u021bia optim\u0103, prevenirea unei \u00eenc\u0103lc\u0103ri a securit\u0103\u021bii datelor nu este nici simpl\u0103, nici u\u0219oar\u0103 (atunci c\u00e2nd sunt activate suficiente m\u0103suri de protec\u021bie). Organiza\u021biile proactive abordeaz\u0103 situa\u021bia dificil\u0103 \u0219i sunt preg\u0103tite pentru ceva ce nu s-a \u00eent\u00e2mplat \u00eenc\u0103. Ele prognozeaz\u0103 riscurile viitoare ale amenin\u021b\u0103rilor cibernetice \u0219i de confiden\u021bialitate. A face acest lucru presupune adesea s\u0103 r\u0103scoleasc\u0103 mun\u021bi de date pentru a g\u0103si un ac \u00een carul cu f\u00e2n &#8211; o bucat\u0103 de malware sau o amenin\u021bare care poate compromite datele critice.<\/p>\n<p>Prevenirea unei bre\u0219e \u00een re\u021beaua dumneavoastr\u0103 \u0219i \u00een sistemele sale necesit\u0103 protec\u021bie \u00eempotriva unei variet\u0103\u021bi de amenin\u021b\u0103ri cibernetice. Pentru fiecare atac, trebuie implementat\u0103 contram\u0103sura adecvat\u0103 pentru a-l \u00eempiedica s\u0103 exploateze o vulnerabilitate sau un punct slab. Prima linie de ap\u0103rare pentru orice organiza\u021bie este evaluarea \u0219i implementarea controalelor de securitate.<\/p>\n<p>Riscul atacurilor cibernetice este prezent \u00een domeniul informatic de mai mult timp dec\u00e2t suntem dispu\u0219i s\u0103 recunoa\u0219tem. Cu toate acestea, ceea ce mul\u021bi nu au reu\u0219it s\u0103 con\u0219tientizeze este c\u0103, \u00een ciuda eforturilor semnificative de securizare \u0219i protec\u021bie a organiza\u021biilor lor, acest c\u00e2mp de lupt\u0103 cibernetic a accelerat pe mai multe fronturi tehnice. Ceea ce s-a \u00eent\u00e2mplat \u00een ultimele c\u00e2teva luni nu ar trebui s\u0103 \u0219ocheze pe nimeni, deoarece mul\u021bi exper\u021bi au avertizat asupra acestui lucru de ani de zile. Mai mul\u021bi factori ne-au condus \u00een acest punct, printre care:<\/p>\n<p><strong>\u00fc Arhitecturi slabe<\/strong><\/p>\n<p><strong>\u00fc Slaba con\u0219tientizare a riscurilor<\/strong><\/p>\n<p><strong>\u00fc Sistem IT vechi<\/strong><\/p>\n<p><strong>\u00fc Lacune de securitate<\/strong><\/p>\n<p><strong>\u00fc Vulnerabilit\u0103\u021bile lan\u021bului de achizi\u021bie de software<\/strong><\/p>\n<p><strong>\u00fc Mijloace de atac cibernetic mai ieftine \u0219i mai disponibile<\/strong><\/p>\n<p>Pute\u021bi s\u0103 v\u0103 preg\u0103ti\u021bi \u0219i s\u0103 v\u0103 reduce\u021bi la minimum expunerea la amenin\u021b\u0103rile la adresa securit\u0103\u021bii cibernetice prin implementarea unor m\u0103suri preventive minu\u021bioase \u0219i atente. Pentru a v\u0103 ajuta s\u0103 \u00eencepe\u021bi, v\u0103 prezent\u0103m mai jos c\u00e2\u021biva factori-cheie pe care s\u0103 \u00eei utiliza\u021bi pentru a evalua starea actual\u0103 a companiei dvs. \u0219i pentru a identifica punctele slabe care trebuie corectate.<\/p>\n<h4><strong>Evaluarea datelor <\/strong><\/h4>\n<p>Ce date manipula\u021bi &#8211; informa\u021bii nesigure, informa\u021bii personale reglementate, informa\u021bii de identificare \u0219i informa\u021bii comerciale confiden\u021biale cheie? Trebuie s\u0103 le p\u0103stra\u021bi pe toate?<\/p>\n<p>Accesul la informa\u021bii &#8211; Cine are acces la informa\u021biile dumneavoastr\u0103 \u0219i la creden\u021bialele de conectare la re\u021belele dumneavoastr\u0103. La ce informa\u021bii \u0219i re\u021bele ale c\u0103ror companii ave\u021bi acces?<\/p>\n<p>Criptare &#8211; C\u00e2t de robust\u0103 este criptarea datelor? Criptarea transform\u0103 datele \u00eentr-un cod pentru a le face ilizibile. Criptarea datelor le face mai pu\u021bin atr\u0103g\u0103toare pentru un infractor cibernetic, deoarece valoarea datelor se pierde dac\u0103 acestea nu pot fi decodate sau citite de c\u0103tre infractorul cibernetic. Criptarea datelor poate oferi, de asemenea, un ad\u0103post sigur \u00een cazul unei \u00eenc\u0103lc\u0103ri a securit\u0103\u021bii datelor, deoarece multe legi statale \u0219i federale exclud informa\u021biile sensibile din defini\u021bia unei \u00eenc\u0103lc\u0103ri dac\u0103 informa\u021biile care fac obiectul \u00eenc\u0103lc\u0103rii au fost criptate.<\/p>\n<h4><strong>Plan <\/strong><\/h4>\n<p>Ave\u021bi un plan actualizat de confiden\u021bialitate \u0219i securitate a datelor \u0219i a\u021bi evaluat dac\u0103 acesta este \u00een conformitate cu legile, reglement\u0103rile \u0219i cerin\u021bele contractuale \u00een vigoare?<\/p>\n<h4><strong>Echipa <\/strong><\/h4>\n<p>A\u021bi identificat o echip\u0103 de r\u0103spuns la \u00eenc\u0103lc\u0103ri, format\u0103 at\u00e2t din membri interni, c\u00e2t \u0219i din speciali\u0219ti externi? Atunci c\u00e2nd are loc o \u00eenc\u0103lcare a securit\u0103\u021bii datelor, ar trebui s\u0103 v\u0103 desemna\u021bi din timp partenerii.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cunoa\u0219terea inamicului: &#8222;DAC\u0102 \u00ce\u021aI CUNO\u0218TI INAMICUL \u0218I TE CUNO\u0218TI \u0218I PE TINE \u00ceNSU\u021aI, NU TREBUIE S\u0102 TE TEMI DE REZULTATUL A O SUT\u0102 DE B\u0102T\u0102LII. DAC\u0102 TE CUNO\u0218TI PE TINE \u00ceNSU\u021aI, DAR NU \u0218I INAMICUL, PENTRU FIECARE VICTORIE OB\u021aINUT\u0102 VEI SUFERI \u0218I O \u00ceNFR\u00c2NGERE. DAC\u0102 NU-\u021aI CUNO\u0218TI NICI DU\u0218MANUL, NICI PE TINE \u00ceNSU\u021aI, VEI SUCOMBA [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6525,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[85],"tags":[126,125,127,124],"class_list":["post-7088","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tendinte","tag-aparare-in-domeniul-securitatii-cibernetice","tag-atac-cibernetic","tag-business-continuity","tag-razboi-cibernetic"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/posts\/7088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/comments?post=7088"}],"version-history":[{"count":1,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/posts\/7088\/revisions"}],"predecessor-version":[{"id":7089,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/posts\/7088\/revisions\/7089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/media\/6525"}],"wp:attachment":[{"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/media?parent=7088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/categories?post=7088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberlevins.com\/ro\/wp-json\/wp\/v2\/tags?post=7088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}