<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Adeoluwa Agbakosi</title>
    <description>The latest articles on Forem by Adeoluwa Agbakosi (@dev180memes).</description>
    <link>https://forem.com/dev180memes</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F785444%2F7084f042-375a-477d-8c9f-a8ecd726e8a2.png</url>
      <title>Forem: Adeoluwa Agbakosi</title>
      <link>https://forem.com/dev180memes</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/dev180memes"/>
    <language>en</language>
    <item>
      <title>Cyber-Security and the Game Theory.</title>
      <dc:creator>Adeoluwa Agbakosi</dc:creator>
      <pubDate>Wed, 30 Mar 2022 01:34:38 +0000</pubDate>
      <link>https://forem.com/dev180memes/cyber-security-and-the-game-theory-58ia</link>
      <guid>https://forem.com/dev180memes/cyber-security-and-the-game-theory-58ia</guid>
      <description>&lt;p&gt;Cyber Security might as well be one of the largest and most interesting fields in the tech world. In this series we would be looking at how Cyber Security relates to Tame Theory and Adversarial thinking. But first of all we need to understand what Cyber Security and the Game Theory is.&lt;/p&gt;

&lt;h3&gt;
  
  
  What is Cyber Security?
&lt;/h3&gt;

&lt;p&gt;Cyber Security is the term used to collectively denote the technologies, processes and controls that are intended to protect systems, networks and data from cyber attackers. To further understand Cyber Security as a whole you should check out this article, &lt;a href="https://dev.to/dev180memes/cyber-security-a-run-through-1jkl"&gt;Cyber Security: A run through&lt;/a&gt;. &lt;/p&gt;

&lt;h3&gt;
  
  
  What is Game Theory?
&lt;/h3&gt;

&lt;p&gt;Game Theory, branch of applied mathematics that provides tools for analyzing situations in which parties, called players, make decisions that are interdependent. This interdependence causes each player to consider the other player’s possible decisions, or strategies, in formulating strategy.&lt;/p&gt;

&lt;p&gt;The Game Theory was originally developed by the Hungarian-born American mathematician John von Neumann and his Princeton University colleague Oskar Morgenstern, a German-born American economist, to solve problems in economics. Though originally meant to be used to solve problems in economics, the Game Theory has nowadays being used in different fields such as cyber security and even warfare.&lt;/p&gt;

&lt;p&gt;Cyber security problems that require rational decision making can be solved in a better way using game theory. But game theory has a limitation if the defender is provided only with limited information on the opponent’s strategy and decisions. Game theory enhances the ability to anticipate the actions of the hackers. To make game theory a practicable approach to solve cyber security issues strategies of hackers should be a finite and predictive set. Ideally it is very difficult to predict the strategies for both attacker and defender in real time.&lt;/p&gt;

&lt;p&gt;Game Theory is a promising research field in the cyber security sector. One very important skill that is acknowledged by researchers is "Adversarial Skill" as described as think like a hacker. This can be used to avoid security threats to the system connected to internet. This skill is widely acknowledged because now a day’s cyber security is dependent on guessing or analyzing the attacker’s strategies.&lt;/p&gt;

&lt;p&gt;Game theory and Cyber security share similar concerns in various aspects of their application. In which payoff with respect to players is not only contingent of the decision he made but it also depends upon the opponent’s behavior. Based on this resemblance, we can use Game theory as a mathematical tool to deal with cyber security problems based on multi agent behaviors.&lt;/p&gt;

&lt;p&gt;Game theory has many components such as:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The players:&lt;/strong&gt; who make decisions with respect to the game.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Actions:&lt;/strong&gt; which are the decisions made by each player.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Payoffs:&lt;/strong&gt; which is the amount of satisfaction either positive or negative derived from each action.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Strategies:&lt;/strong&gt; which are the future actions set in place with respect to the past and expected actions of the opponent.&lt;/p&gt;

&lt;p&gt;Their are several types of games in the game theory. We have Cooperative games, Non-cooperative games, Static games, Dynamic games, Complete information games, Incomplete information games, Perfect information games, Imperfect information games. Cyber security can be described under the non-cooperative, incomplete information and Imperfect information types of games.&lt;/p&gt;

&lt;h3&gt;
  
  
  Game Theory Methods for Cyber Security Applications:
&lt;/h3&gt;

&lt;p&gt;Game Theory for cyber security applications can be divided&lt;br&gt;
into six categories:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Physical Layer Security.&lt;/li&gt;
&lt;li&gt;Self-Organised Network Security.&lt;/li&gt;
&lt;li&gt;Intrusion Detection and Prevention.&lt;/li&gt;
&lt;li&gt;Privacy preservation and Anonymity.&lt;/li&gt;
&lt;li&gt;Economics of Cyber Security&lt;/li&gt;
&lt;li&gt;Cloud Computing Security.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Consider Self-Organized Network Security and Cloud computing Security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Self-Organised Network Security (SON):&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Game theoretic approaches that are used for designing security protocols for SONs are Vehicular Networks (VANETs), Wireless Sensor Networks and Mobile Ad Hoc Networks (MANETs). Most of the game theoretic approaches consider that only two players will be there in the game.&lt;/p&gt;

&lt;p&gt;Attacker: The attacker is an opponent who makes malicious entry into the system with the intendment of threatening its security. The strategies of the attacker can vary from a single action to a sequence of differed counter activities. In this study, we limit our interests to such attacks that consist of a series of activities that directs towards an ultimate goal. &lt;/p&gt;

&lt;p&gt;Defender: The defender on the other side is responsible for applying proper defense techniques to secure the system from various malicious attacks from attacker. The defender has a set of counter strategies to monitor and protect the system. The main aim of this player is to make pre-emptive responses in a manner where he has limited knowledge of the system status, purely relying on the counter strategies.&lt;/p&gt;

&lt;p&gt;These assumptions on players are not practical in MANETs. The strategic decisions of each node in MANETs can be computed in a fully distributed approach, where the decision can be made without centralized administration and each node only needs to know the information of its own state and thereby aggregate effect of the other node in the MANET. In few networks Digital signature is widely used, it may provide security but it introduces delay due to signature verification which in turn reduces Quality of Service QoS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Computing Security:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditional security is not suitable for Cloud computing concepts such as multi-tenancy, resource sharing and resource outsourcing. These are the new challenges for security researches.&lt;/p&gt;

&lt;p&gt;Security-aware virtual machines (VM) have been proposed by researchers with the combination of game theory in public cloud, where multiple Nash Equlibria has been included for security game in public cloud i.e., defender has counter actions for each one of the attackers strategies. Nash Equilibrium is a combination of Set of strategies and payoffs which results in stable state where no player has benefit when there is change in strategies on any player in the game.&lt;/p&gt;

&lt;p&gt;Scalable security risk assessment model using game theory has also been proposed for cloud computing in order to evaluate the risk. Main aim of this risk assessment is to decide who should fix the risk in the system i.e. by the cloud provider or tenant of the system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CHALLENGES&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The main challenges faced while designing the game theory model are:&lt;/p&gt;

&lt;p&gt;Defining payoff function for each player in the game is practically impossible. But payoff function is a key procedure in game theory because result of the game is directly dependent on the result of payoff function.&lt;/p&gt;

&lt;p&gt;All the game models and strategies are based upon assumptions. But in reality the strategies involves in cyber security problems are infinite and dynamic. Based on assumptions result of the payoff function may be good. But if it is implemented practically it is difficult to achieve good result from payoff function.&lt;/p&gt;

&lt;p&gt;Defining payoff functions for attacker and defender is practically impossible. Strategies based on assumptions cannot be implemented in real time.&lt;/p&gt;

&lt;p&gt;The proof for existence of Nash Equilibrium is only logical not constructive. There are not methods available to implement Nash Equilibrium practically. All these assumptions cannot be used without proof because it may result in security compromise.&lt;/p&gt;

&lt;p&gt;For now the concept of game theory in cyber security is purely theoretical and remains an open research area. &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>research</category>
      <category>career</category>
    </item>
    <item>
      <title>Deploying Recommender Systems Algorithm to a Web App.</title>
      <dc:creator>Adeoluwa Agbakosi</dc:creator>
      <pubDate>Fri, 04 Mar 2022 20:16:28 +0000</pubDate>
      <link>https://forem.com/dev180memes/deploying-recommender-systems-algorithm-to-a-web-app-1gbo</link>
      <guid>https://forem.com/dev180memes/deploying-recommender-systems-algorithm-to-a-web-app-1gbo</guid>
      <description>&lt;p&gt;The web today revolves around content recommendation, from major platforms like Amazon where goods are recommended to you, to social media applications like Facebook where friends are recommended for you. Recommendation systems has become the new normal for the web, it has become rarely difficult to find a major web page without one form of recommendation or the other.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;If you do not have previous knowledge of how recommender systems work, you might want to check out this &lt;a href="https://developers.google.com/machine-learning/recommendation" rel="noopener noreferrer"&gt;Recommender Systems Course&lt;/a&gt; on Google.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;For this article i will be building a Movie Recommendation App. This app is going to take input( the name of a movie a user likes ) and recommend movies that are related to it. The working logic here is that if you like a movie, then you should also like movies related to it.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;You can view the resulting application &lt;a href="https://moviereceng.herokuapp.com/" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;br&gt;
View the source codes &lt;a href="https://github.com/Dev-180Memes/Recommendation-Engine.git" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Now lets get to work.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Dataset.
&lt;/h2&gt;

&lt;p&gt;The dataset used in building the recommender algorithm is the &lt;a href="https://www.kaggle.com/tmdb/tmdb-movie-metadata" rel="noopener noreferrer"&gt;TMBD 5000 Movie Dataset&lt;/a&gt; available on &lt;a href="//kaggle.com"&gt;Kaggle&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The dataset contains 4803 entries. Let's go through the dataset very briefly so that we can focus on building the machine learning model part.&lt;/p&gt;

&lt;p&gt;We load the two csv files into df1 &amp;amp; df2 dataframes&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdcet0iynzxxyeoiyuz24.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdcet0iynzxxyeoiyuz24.png" alt="df1 dataframe"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0au54ox11v7h385pkwac.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0au54ox11v7h385pkwac.png" alt="df2 dataframe"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Instead of handling both the data frames, We merged the data frames so that we have to work on a single data frame. The dataset thankfully does not have a large number of empty values. Let’s handle them one by one. Here is an overview of all the columns.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6y1hygh3llinp2v9bxhf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6y1hygh3llinp2v9bxhf.png" alt="Columns View"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Looking at the id column, which is unique for each movie, we do not need it because it will not contribute to the recommendations. Also, the tagline column should be eliminated because most of the movies have an overview and thus the tagline would result in more of a similar context. Dropping these 2 columns results in a data frame with 21 attributes.&lt;/p&gt;

&lt;p&gt;There are multiple columns where we have a string or node which contains a dictionary. We can use literal_eval from ast module to remove these strings or nodes and get the embedded dictionary. So we use literal_eval for attributes cast, keywords, crew, &amp;amp; genres. Now we have these attributes in the form of a dictionary, we can use these attributes and get important features such as director names, a very important factor for our recommender system. Also for the cast, keywords, &amp;amp; genre attributes, we can return the top 3 names in each category in a list. Now we can create a single column which will a sum of all these 4 attributes, which are very dominant factors for our recommender system. Let’s call this column “soup” (because it’s like a soup/combination of 4 attributes).&lt;/p&gt;

&lt;h2&gt;
  
  
  Building The Machine Learning Model.
&lt;/h2&gt;

&lt;p&gt;To build our model, we first create a count matrix that is created by the help of a &lt;a href="https://scikit-learn.org/stable/modules/generated/sklearn.feature_extraction.text.CountVectorizer.html" rel="noopener noreferrer"&gt;count vectorizer&lt;/a&gt;. We create a count vector with English stopwords &amp;amp; fit and transform over the soup column we just created in the previous section. Scikit-learn has a very beautiful method called &lt;a href="https://www.machinelearningplus.com/nlp/cosine-similarity/" rel="noopener noreferrer"&gt;cosine similarity&lt;/a&gt;. It is simply a metric that is used to determine how similar documents are, irrespective of their size. After building the cosine similarity matrix for our dataset, we can now sort the results to find out the top 10 similar movies. We return the movie title &amp;amp; indexes to the user.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

import difflib
import pandas as pd
from sklearn.feature_extraction.text import CountVectorizer
from sklearn.metrics.pairwise import cosine_similarity

df2 = pd.read_csv('./model/tmdb.csv')

count = CountVectorizer(stop_words='english')
count_matrix = count.fit_transform(df2['soup'])

cosine_sim2 = cosine_similarity(count_matrix, count_matrix)

df2 = df2.reset_index()
indices = pd.Series(df2.index, index=df2['title'])
all_titles = [df2['title'][i] for i in range(len(df2['title']))]

def get_recommendations(title):
    cosine_sim = cosine_similarity(count_matrix, count_matrix)
    idx = indices[title]
    sim_scores = list(enumerate(cosine_sim[idx]))
    sim_scores = sorted(sim_scores, key=lambda x: x[1], reverse=True)
    sim_scores = sim_scores[1:11]
    movie_indices = [i[0] for i in sim_scores]
    tit = df2['title'].iloc[movie_indices]
    dat = df2['release_date'].iloc[movie_indices]
    return_df = pd.DataFrame(columns=['Title','Year'])
    return_df['Title'] = tit
    return_df['Year'] = dat
    return return_df


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;h2&gt;
  
  
  Creating the Web App.
&lt;/h2&gt;

&lt;p&gt;Now that we have our algorithm for the recommender system we want to create an interface where a user can input movies and receive recommendation based on the movie inserted.&lt;/p&gt;

&lt;p&gt;The easiest framework to use for this kind of task is the flask framework. If you have no previous knowledge of how the framework works you can check out this article if found on real python &lt;a href="https://realpython.com/python-web-applications/" rel="noopener noreferrer"&gt;here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After creating our html templates we use the codes below in our app.py to simple render our templates.&lt;/p&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

import flask
app = flask.Flask(__name__, template_folder=’templates’)
# Set up the main route
@app.route(‘/’, methods=[‘GET’, ‘POST’])
def main():
    if flask.request.method == ‘GET’:
        return(flask.render_template(‘index.html’))


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Now that we have our index.html rendered, let’s hope that the user enters a movie name. Upon entering, the user clicks on the submit button and the form is submitted.&lt;/p&gt;

&lt;p&gt;Now we have a movie name, which is submitted by the user in the form. Let’s hold this name into the m_name variable in python. We accept the form submission using the post method.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

if flask.request.method == ‘POST’:
    m_name = flask.request.form[‘movie_name’]
    m_name = m_name.title()


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;We also convert the input movie name to the title format. The title form will simply convert every character of each word to upper case. Now we have 2 options:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If the input movie name is misspelled or does not exist in the database.
&lt;em&gt;— If wrong, show error page &amp;amp; possible similar movie name based on the input.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;If a correct movie name is entered &amp;amp; present in the database, then show the recommendations.&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

if m_name not in all_titles:
   return(flask.render_template(‘negative.html’,name=m_name))
else:
   result_final = get_recommendations(m_name)
   names = []
   dates = []
   for i in range(len(result_final)):
      names.append(result_final.iloc[i][0])
      dates.append(result_final.iloc[i][1])
   return flask.render_template(‘positive.html’,movie_names=names,movie_date=dates,search_name=m_name)


&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;negative.html is rendered if the input from the user does not match with all_titles list which contains all the movie names present in the database.&lt;br&gt;
Negative.html page simply shows possible reason(s) for not able to find the searched movie. It also searches throughout the whole database and makes use of similar word search techniques(difflib.get_close_matches() method in python &amp;amp; Levenshtein distance method ) to find the closest match and suggests the user about the movie names which are very similar to the one user entered. All this is done using javascript and finally rendered on the HTML page.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;positive.html is rendered if the input movie name matches with the database. If so, we call the get_recommendations function by passing the movie name. The get_recommendations function is the same as we have discussed in section 2. We take the movie name, calculate the cosine matrix with respect to the dataset and find the most similar movie to the input movie. We sort the results and return back top 10 results. We send similar movie names as well as their release date in a list to the positive.html. We create a tabular layout and print the 10 movies along with their release dates.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With this we have a functional recommendation engine where you can input movies and get movie recommendations based on movies avalable in our database.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;You can view the resulting application &lt;a href="https://moviereceng.herokuapp.com/" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;br&gt;
View the source codes &lt;a href="https://github.com/Dev-180Memes/Recommendation-Engine.git" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>python</category>
      <category>programming</category>
      <category>webdev</category>
      <category>datascience</category>
    </item>
    <item>
      <title>Cyber Security: A run through.</title>
      <dc:creator>Adeoluwa Agbakosi</dc:creator>
      <pubDate>Sat, 19 Feb 2022 21:47:18 +0000</pubDate>
      <link>https://forem.com/dev180memes/cyber-security-a-run-through-1jkl</link>
      <guid>https://forem.com/dev180memes/cyber-security-a-run-through-1jkl</guid>
      <description>&lt;h4&gt;
  
  
  When asked about cyber-security what comes to mind?
&lt;/h4&gt;

&lt;p&gt;Most people will answer this question and say &lt;strong&gt;hacking&lt;/strong&gt; or some even say Penetration testing. Cyber-security goes way beyond hacking and pen testing, according to IBM.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Cyber-security is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cyber-security measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In simpler English Cyber-security is the protection of internet-connected systems such as hardware, software and data from cyber-threats. Before diving into the elements of cyber-security we should first of all understand some basic terms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hardware:&lt;/strong&gt; &lt;br&gt;
Quite simply, computer hardware is the physical components that a computer system requires to function. It encompasses everything with a circuit board that operates within a PC or laptop; including the motherboard, graphics card, CPU (Central Processing Unit), ventilation fans, webcam, power supply, and so on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Software:&lt;/strong&gt; &lt;br&gt;
Computer software is a program that tells a computer what to do. These instructions might be internal commands, such as updating the system clock, or a response to external input received from the keyboard or mouse.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data:&lt;/strong&gt; &lt;br&gt;
Ever heard the phrase &lt;em&gt;Data is the new gold&lt;/em&gt;. Well data is a collection of facts, such as numbers, words, measurements, observations or just descriptions of things. Data is most commonly the target of cyber-threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cyber-Threats:&lt;/strong&gt; &lt;br&gt;
A cyber threat or cyber-security threat is a malicious act intended to steal or damage data or disrupt the digital well-being and stability of an enterprise. Cyber threats include a wide range of attacks ranging from data breaches, computer viruses, denial of service, and numerous other attack vectors.&lt;/p&gt;

&lt;p&gt;Now that we understand what all the terms above are we can now start dissecting the different aspects involved in cyber-security starting with the various types of cyber-threats.&lt;/p&gt;

&lt;h3&gt;
  
  
  Types of Cyber-Threats
&lt;/h3&gt;

&lt;p&gt;A cyber-threat as explained earlier is a is a malicious act intended to steal or damage data. Their are several types of cyber-threat, each of which has different effects and mode of execution. A few of them are:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Malware:&lt;/strong&gt; &lt;br&gt;
This is a form of malicious software in which any file or program can be used to harm a computer user. Malware's are the most common type of cyber attacks and they include but are not limited to worms, viruses, Trojans and spyware.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Ransomware:&lt;/strong&gt; &lt;br&gt;
Imagine being locked out of your system, and being told to pay before you can access it. This attack involves an attacker locking the victim's computer system files -- typically through encryption -- and demanding a payment to decrypt and unlock them. Large organization such as hospitals data farms and government offices commonly fall prey to this form of cyber attack.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Social engineering:&lt;/strong&gt;&lt;br&gt;
This is an attack that relies on human interaction to trick users into breaking security procedures to gain sensitive information that is typically protected.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Phishing:&lt;/strong&gt;&lt;br&gt;
This is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data, such as credit card or login information. Phishing is another very common cyber attack with the number of people falling prey to this rising on a daily basis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Spear phishing:&lt;/strong&gt;&lt;br&gt;
This is a type of phishing attack that has an intended target. This target could be a user, organization or business.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Insider threats:&lt;/strong&gt;&lt;br&gt;
This are security breaches or losses caused by humans -- for example, employees, contractors or customers. Insider threats can be malicious or negligent in nature.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Distributed denial-of-service (DDoS):&lt;/strong&gt;&lt;br&gt;
This attacks are those in which multiple systems disrupt the traffic of a targeted system, such as a server, website or other network resource. By flooding the target with messages, connection requests or packets, the attackers can slow the system or crash it, preventing legitimate traffic from using it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. Advanced persistent threats (APTs):&lt;/strong&gt;&lt;br&gt;
This are prolonged targeted attacks in which an attacker infiltrates a network and remains undetected for long periods of time with the aim to steal data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;8. Man-in-the-middle (MitM):&lt;/strong&gt;&lt;br&gt;
This attacks are eavesdropping attacks that involve an attacker intercepting and relaying messages between two parties who believe they are communicating with each other.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;9. SQL Injection:&lt;/strong&gt;&lt;br&gt;
This is a code injection technique used to attack data-driven applications by inserting malicious SQL statements into the execution field. The database is a vital part of any organization. This is handled by high-level security in an organization. SQL is a structured query language. Used to interact and to manipulate the database.&lt;/p&gt;

&lt;p&gt;We could go on and on about the various types of cyber attacks but this would then be a very long read. Other common types of cyber attacks are botnets, drive-by-download attacks, exploit kits, malvertising, vishing, credential stuffing attacks, cross-site scripting (XSS) attacks, business email compromise (BEC) and zero-day exploits.&lt;/p&gt;

&lt;h3&gt;
  
  
  Elements of cyber-security
&lt;/h3&gt;

&lt;p&gt;The cyber-security field can be broken down into various sections. This sections working together contributes to a great cyber-security program. This sections are as follows:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Information or Data Security:&lt;/strong&gt;&lt;br&gt;
Information security, often shortened to infosec, is the practice, policies and principles to protect digital data and other kinds of information. Infosec responsibilities include establishing a set of business processes that will protect information assets, regardless of how that information is formatted or whether it is in transit, is being processed or is at rest in storage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Application Security:&lt;/strong&gt;&lt;br&gt;
Application security, or appsec, is the practice of using security software, hardware, techniques, best practices and procedures to protect computer applications from external security threats. In software development, security used to be an afterthought, today security has become a very critical aspect of the development process right from design to deployment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Disaster Recovery Planing:&lt;/strong&gt;&lt;br&gt;
So you are thinking "what does disaster recovery have to do with cybersec?", disaster recovery is very important to cyber security especially with it firms that deal in essential services like financial services. &lt;br&gt;
A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work after an unplanned incident. A DRP is an essential part of a business continuity plan (BCP). It is applied to the aspects of an organization that depend on a functioning IT infrastructure. A DRP aims to help an organization resolve data loss and recover system functionality so that it can perform in the aftermath of an incident, even if it operates at a minimal level.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Operational Security:&lt;/strong&gt;&lt;br&gt;
OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines what is required to protect sensitive information and prevent it from getting into the wrong hands. &lt;br&gt;
OPSEC gets information technology (IT) and security managers to view their operations and systems as potential attackers would. OPSEC includes analytical activities and processes, such as social media monitoring, behavior monitoring and security best practices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Cloud Securitiy:&lt;/strong&gt;&lt;br&gt;
Cloud security refers to the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.&lt;/p&gt;

&lt;p&gt;Other elements of cyber-security are&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;End-User Education&lt;/li&gt;
&lt;li&gt;Critical Infrastructure Security&lt;/li&gt;
&lt;li&gt;Physical Security&lt;/li&gt;
&lt;li&gt;Network Security&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Maintaining cybersecurity in a constantly evolving threat landscape is a challenge for all organizations. Traditional reactive approaches, in which resources were put toward protecting systems against the biggest known threats, while lesser known threats were undefended, is no longer a sufficient tactic. &lt;br&gt;
To keep up with changing security risks, a more proactive and adaptive approach is necessary. Several key cybersecurity advisory organizations offer guidance. For example, the National Institute of Standards and Technology (NIST) recommends adopting continuous monitoring and real-time assessments as part of a risk assessment framework to defend against known and unknown threats.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu3qdtxcejwce2uswhd2f.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu3qdtxcejwce2uswhd2f.jpg" alt="Image description"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Job Opportunities in Cyber-security
&lt;/h3&gt;

&lt;p&gt;As more cyber-threats emerge the need for cyber-security professionals is increasing making room for different opportunities in this field.&lt;/p&gt;

&lt;p&gt;IT professionals and other computer specialists are needed in security roles, such as:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chief Information Security Officer (CISO):&lt;/strong&gt;&lt;br&gt;
CISO is the individual who implements the security program across the organization and oversees the IT security department's operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chief Security Officer (CSO):&lt;/strong&gt;&lt;br&gt;
CSO is the executive responsible for the physical and/or cyber-security of a company.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Engineers:&lt;/strong&gt;&lt;br&gt;
A Security Engineer protects company assets from threats with a focus on quality control within the IT infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Architects:&lt;/strong&gt;&lt;br&gt;
Security Architects are responsible for planning, analyzing, designing, testing, maintaining and supporting an enterprise's critical infrastructure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Analysts:&lt;/strong&gt;&lt;br&gt;
Security Analysts have several responsibilities that include planning security measures and controls, protecting digital files, and conducting both internal and external security audits.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Penetration Testers:&lt;/strong&gt; &lt;br&gt;
Pen Testers are Ethical Hackers who test the security of systems, networks and applications, seeking vulnerabilities that could be exploited by malicious actors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat Hunters:&lt;/strong&gt;&lt;br&gt;
Threat Hunters are threat analysts who aim to uncover vulnerabilities and attacks and mitigate them before they compromise a business.&lt;/p&gt;

&lt;p&gt;Other cyber-security careers include security consultants, data protection officer, cloud security architects, security operations manager (SOC) managers and analysts, security investigators, cryptographers and security administrators.&lt;/p&gt;

&lt;p&gt;The topic of cyber-security is one that cannot be discussed with one article, but with this few points a beginner should be able to understand cyber-security to an extent.&lt;/p&gt;

&lt;p&gt;So now lets answer the question that started all this in the first place.&lt;/p&gt;

&lt;h4&gt;
  
  
  When asked about cyber-security what comes to mind?
&lt;/h4&gt;

</description>
      <category>beginners</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
