Cyber security is the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It is also known as information technology security or electronic information security. The term is applicable in contexts ranging from businesses to mobile computing, and can be divided into several common categories.
GMKA continues to develop new solutions in the field of Cyber Security every day…
• Network security is the practice of protecting a computer network from intruders, whether they are targeted attackers or opportunistic malware.
• Application security focuses on protecting software and devices from threats. A compromised application may gain access to data designed to protect it. Effective security begins before a program or device is distributed, when it is still in the design phase.
• Information security maintains the integrity and confidentiality of data both in storage and in transfer.
• Operational security includes processes and decisions regarding the treatment and protection of data assets. This includes the authorizations users have to access a network and the procedures that determine how and where data can be stored or shared.
• Disaster recovery and business continuity define how an organization responds to a cybersecurity incident or other event that causes loss of porcess or data. Disaster recovery policies determine how the organization restores its processes and information to return to the same operating capacity as before the event. Business continuity is the plan by which the organization falls back on while trying to operate without specific resources.
• End-user training addresses the most unpredictable cybersecurity factor: Anyone who does not follow good security practices can accidentally infect another secure system. Teaching users how to delete suspicious email attachments, not to plug in unidentified USB drives, and various other important lessons is vital to the security of any organization.

THE SCALE OF THE CYBER THREAT
The global cyber threat continues to evolve rapidly with an increasing number of data breaches every year. It is revealed that a staggering 7.9 billion records were subject to data breaches in the first nine months of 2019 alone. This figure is more than double the number of registrations (112%) that emerged in the same period of 2018.
Healthcare, retailers, and government agencies suffered the most from breaches by malicious criminals responsible for most incidents. Some of these industries are more attractive to cybercriminals as they collect financial and medical data, but any business that uses a network can become a target of attacks on clients and client data or corporate espionage.
GMKA predicts that as the scale of the cyber threat continues to increase, worldwide spending on cybersecurity solutions will reach $133.7 billion by 2022. Governments around the world have guided organizations to help them implement effective cybersecurity practices in response to the growing cyber threat.
To combat the proliferation of malicious code and aid early detection, this framework recommends continuous, real-time monitoring of all electronic resources.
TYPES OF CYBER THREATS
There are three layers of threats facing cybersecurity:
1. Cybercrime: Involves single actors or groups targeting systems for financial gain or business disruption.
2. Cyberattack: Usually involves politically motivated information gathering.
3. Cyber terrorism: Designed to undermine electronic systems in a way that causes panic or fear.
So how do malicious actors gain control of computer systems? Here are some common methods used to threaten cybersecurity:
MALWARE
A malicious software is also referred to as “Malware”. As one of the most common cyber threats, malware is software created by a cybercriminal or hacker to corrupt or damage a legitimate user’s computer. Typically spread through a spam email attachment or legitimate-looking download, malware can be used by cybercriminals to make money or in politically motivated cyberattacks.
There are several types of malware:
- Virus: A program that self-replicates, attaches itself to clean file and spreads to computer system, infects files using malicious code.
- Trojans: A type of malware disguised as legitimate software. Cybercriminals trick users into installing trojans on their computers, thereby damage their computers or collect data.
- Spyware: A program that secretly records what a user is doing so that cybercriminals can use this information. For example, spyware can capture credit card information.
- Ransomware: A malware that locks and threatens to delete a user’s files and data unless a ransom is paid.
- Adware: Advertising software that can be used to spread malware.
- Botnets: Computer networks that spread malware that cybercriminals use to perform online tasks without the user’s consent.
- SQL injection: SQL (structured query language) injection is a type of cyberattack used to check and steal data from a database. Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a database via a malicious SQL statement. This gives them access to sensitive information contained in the database.
PHISHING
Phishing is when cybercriminals target victims using emails that ask for sensitive information and appear to be from a legitimate company. Phishing attacks are often used to trick people into transferring credit card data and other personal information.
Tampering Attack (MITM)
A tampering attack is a type of cyber threat in which cybercriminals intercept communication between two people in order to steal data. For example, on an unsecured Wi-Fi network, an attacker could withhold data passed to and from the victim’s device.
Denial of Service attack (DoS)
A denial of service attack is when cybercriminals block networks and servers with traffic, preventing a computer system from fulfilling legitimate requests. This renders the system unusable, preventing an organization from performing vital functions.
The latest cyber threats
What are the latest cyber threats that individuals and organizations need to protect against? Here are some of the latest cyber threats reported by GMKA Cyber.
DRIDEX MALWARE
Dridex is a financial trojan with various capabilities. It has been affecting victims and infecting computers through phishing emails or existing malware since 2014. Capable of stealing passwords, banking information and personal data that can be used in fraudulent transactions, Dridex has caused massive financial losses amounting to hundreds of millions.
To protect against attacks, GMKA CYBER recommends making sure that “devices are patched, antivirus is turned on, up-to-date, and files are backed up”.
Scammers
In February 2020, users were warned about cybercriminals who commit trust fraud by using dating sites, chat rooms and apps. Criminals take advantage of people looking for new partners and trick victims into giving their personal data.
Emotet malware
GMKA warns of a widespread global cyber threat from Emotet malware..
Emotet is an advanced trojan that can steal data and install other malware as well. Emotet excels with uncomplicated passwords. This is a reminder of the importance of creating a secure password to protect against cyber threats.
End user protection
End-user protection, or endpoint security, is an essential element of cybersecurity. Ultimately, the end user is an individual who accidentally installs malware or another form of cyber threat on their desktop computer, laptop, or mobile device.
So how do cybersecurity measures protect end users and systems? First of all, cyber securityrelies on cryptographic protocols to encrypt emails, files and other important data. This not only protects the transmitted information, but also protects against loss or theft.
In addition, end-user security software scans for pieces of malicious code on computers, quarantines that code, and then removes it from the device. Security programs can even detect and remove malicious codes hidden in the Master Boot Record (MBR). They are designed to encrypt or delete data on the computer’s hard drive.
Electronic security protocols also focus on real-time malware detection. Most of these help defend against viruses or trojans (polymorphic and metamorphic malware) that change shape with each run, using intuitive and behavioral analysis to monitor a program’s behavior and code. Security programs can confine potentially malicious programs to a virtual bubble separate from the user’s network to analyze their behavior and learn how to better detect new infections.
Security programs continue to develop new defenses as GMKA cybersecurity experts identify new threats and new ways to combat them. To get the most out of end-user security software, employees need to be trained on how to use the software. Most importantly, keeping this security software running and updated frequently ensures that it can protect users against the latest cyber threats.
Cybersecurity tips: Protect yourself against cyber attacks
How can businesses and individuals be protected against cyber threats? Here are our top cybersecurity tips:
1. Update your software and operating system: This means you’re getting the most up-to-date security patches.
2. Use an antivirus software: Security software detects and removes threats. Keep your software up to date to ensure the best level of protection.
3. Use strong passwords: Make sure your passwords are not easy to guess..
4. Do not open email attachments from unknown senders: These attachments may be infected with malware.
5. Do not click on links in emails from unknown senders or on unrecognized websites: This is a common method of spreading malware.
6. Avoid using unsecured Wi-Fi networks in public places: Unsecured networks leave you vulnerable to attacks to interfere with operations.

• The Concept of Cybercrime and Its Types
• Cybercrimes Specific to Turkey
• Cybercrimes in Turkey with Examples
• Cybercrimes and Consequences Not Reflected on the Media
• Cyber Threat, Cyber Blackmail Concepts in Turkey
• Cybercrime Statistics from Turkey
• Cybercrimes Around the World
• Cybercrime Around the World With Examples
• Malware as a Cyber Weapon Tool
• Importance of Password and Encryption in Cybercrime
• Disk Encryption Methods and Tools for Data Retention
• Password Cracking Techniques
• Password Tests for Windows, Linux, MacOS systems
• Current Password Cracking Techniques and Tools
• Finding TrueCrypt Protected Disk Password
• Identification of Encrypted –hidden- areas in Disc Analysis
• Password Cracking Processes for Encrypted Documents and Files
• Determination of Files Protected by Steganography and Data Extraction
• DoS/DDoS Fundamentals
• DDoS Attacks and Cyber Blackmail
• Turkey-Specific DDoS Statistics
• DDoS Attack Tools and Methods
• A Example DDoS Attack and Analysis
• Botnet Concept and Areas of Use
• BotNet Creation Tools
• IP Spoofing in DDoS Attacks
• How do DDoS Prevention Systems work?
• How DDoS Prevention Systems Can Be Bypassed?
• DDoS Attacks Analyses
• Open Source Intelligence Gathering Concept
• What is it, What Does It Do?
• Areas of Use Today
• Open Source Intelligence Tools
• Using Google, Shodan and Other Search Engines for Intelligence Purposes
• What Can Be Obtained by Using Google?
• Corporate Firms Hacked by Using Open Intelligence
• Real Examples from Turkey
• Intelligence Gathering on the Internet with Examples
• Fundamental Forensic Analysis Methods
• Collecting Data through Hacked Systems
• Memory Analysis Methods
• Memory Analysis Tools and Methods
• Memory Analysis and Challenges in Linux Systems
• Memory Analysis in Windows Systems
• Memory Analysis of a Malware-Infected System
• Profiling from Character Analysis
• Basic Working Structure of the Internet
• Package, Protocol Concepts and Their Importance in terms of Network Forensics
• Network Traffic Analysis Tools
• DPI Systems and Areas of Use
• Data Extraction in Network Traffic
• E-mail Header Analysis
• IP Storage Methods
• Analysis of Web Based Attacks
• Inadequacy of Today’s Cyber Defense Systems
• A Sample Web Hacking Demo and Network Analysis
• A Sample Web Hacking Demo and Log Analysis
• Log Deletion Methods and Tools on Windows / Linux Systems