{"id":25854,"date":"2019-03-18T11:45:10","date_gmt":"2019-03-18T09:45:10","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=25854"},"modified":"2023-08-10T10:51:42","modified_gmt":"2023-08-10T08:51:42","slug":"how-to-detect-a-cyberattack","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/","title":{"rendered":"Detecting Cyberattacks Through the Ever-evolving Cybersecurity Industry"},"content":{"rendered":"<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Slot_36_Q4_banner_970x300px-copy.jpg\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Slot_36_Q4_banner_500x278px-copy.jpg\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>Cybersecurity has come a long way since its inception in the 1990s.<sup>1<\/sup>&nbsp;In the beginning, hackers were generally considered a nuisance, and their hacks \u2013 which were pretty limited in terms of their scope \u2013 were designed more to cause trouble than harm.<\/p>\n<p>When the internet began to take centre stage to businesses, and our lives \u2013 each new generation experiences increasingly sophisticated cyber attacks, and this brings about greater damage. The cybersecurity market and industry have had to evolve to effectively counter these attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It all started here<\/h2>\n\n\n\n<p>It is generally accepted that the first created virus was called \u2018The Creeper\u2019, which infected \u2018Arpanet\u2019 \u2013 the foundation of the internet \u2013 in 1971.<sup>2<\/sup>&nbsp;However, computer viruses and worms were predicted as early as 1949 by the mathematician John von Neumann, in his paper \u2018Theory and Organisation of Complicated Automata,\u2019 in which he proposed that a computer programme could reproduce.<sup>3<\/sup><\/p>\n\n\n\n<p>\u2018The Creeper\u2019, was designed by Bob Thomas, an engineer who worked at BBN. The same company where email inventor, Ray Tomlinson worked. It wasn\u2019t created to be malicious. In fact, infected machines would simply show the message, &#8220;I&#8217;m the creeper: catch me if you can,&#8221; but no damage was inflicted. In response to \u2018The Creeper\u2019s\u2019 blatant challenge, the first antivirus software was created, know as \u2018The Reaper\u2019. It was also a self-replicating programme, which spread through the system in much the same way as \u2018The Creeper\u2019, and removed the offending virus from infected computers.<\/p>\n\n\n\n<p>The term \u2018computer virus\u2019 was coined in the early 1980s when Fred Cohen, a PhD student at the University of Southern California, came up with the idea of using self-replicating software that spreads by attaching itself to existing programmes in order to attack the security of multi-user computing systems.<sup>4&nbsp;<\/sup>When he showed his idea to Len Adleman, his thesis advisor, Adleman, remarked on how similar this principle is to a biological virus that uses the resources of the host cell it attacks to reproduce itself. The term \u2018computer virus\u2019 was born.<sup>5<\/sup><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Morris worm creates huge impact<\/strong><\/h2>\n\n\n\n<p>The Morris worm was released from an <a href=\"https:\/\/www.getsmarter.com\/universities\/mit\" target=\"_blank\" rel=\"noopener noreferrer\">MIT<\/a> computer by graduate student, Robert Tappan Morris at Cornell University in November 1988<sup>6.<\/sup> It spread to internet-connected computers running the BSD variant of UNIX. Designed to be undetectable, a design flaw led it to create far more copies of itself than Morris estimated, resulting in the drastic over-taxing of all the computers it infected. This made it easy to detect, and made it possible to repair the back doors that it exploited.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>When he showed his idea to Len Adleman, his thesis advisor, Adleman, remarked on how similar this principle is to a biological virus that uses the resources of the host cell it attacks to reproduce itself. The term \u2018computer virus\u2019 was born.<\/p><\/blockquote><\/figure>\n\n\n\n<p>The Morris worm was not intended to be destructive, however, it caused computers to slow and buckle under the weight of unnecessary processing. The reason for Morris creating the worm is unclear; some speculate that the release was either premature or accidental.<sup>7<\/sup> Regardless, the worm brought about two events that have become a major focus for those in IT.<\/p>\n\n\n\n<p>First, Morris became the first person to be tried under the new Computer Fraud and Abuse Act of 1986, 18 U.S.C., section 1030(<em>a<\/em>)(5)(A).<sup>8<\/sup> Morris was tried, convicted and sentenced to three years of probation, <br>400 hours of community service, a fine of $10,050, and the costs of his supervision.<\/p>\n\n\n\n<p>Secondly, the Computer Emergency Response Team (CERT) was created by the Defense Advanced Research Projects Agency (DARPA) in the US. Their role was to coordinate information and responses to computer vulnerabilities, risks, and security.<sup>9<\/sup><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The evolution of viruses in applications, malware and bots <\/h2>\n\n\n\n<p><strong>The early 2000s marked the rise of viruses being spread through applications (apps) \u2013 the third generation of malicious cyberattacks<\/strong>. Defensive strategies were evolving to combat cybersecurity attacks, but not as fast as the viruses were growing. What followed was the onset of malware, zero-day threats, bots, and other forms of attacks.<\/p>\n<p>These gave rise to the following defensive strategies:<\/p>\n<ul>\n<li><strong>Sandboxing<\/strong><\/li>\n<\/ul>\n\n\n\n<p>According to TechTerms this is a software management strategy that isolates applications from important system resources and other programmes and serves as another layer of security against malware or harmful applications penetrating systems.<sup>10<\/sup><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Anti-bot <\/strong><\/li>\n<\/ul>\n\n\n\n<p>Bots interact with websites much the same way as humans, making them more difficult to detect. Bad bots perform activities such as web scraping, competitive data mining, personal and financial data harvesting, account takeover, digital ad fraud, spam and transaction fraud. They can cause significant harm to businesses. Anti-bot strategies differentiate between human and bot traffic, both bad and good, in order to isolate and terminate where necessary.<sup>11<\/sup><\/p>\n\n\n\n<div class=\"related-programme-block\">\n<div class=\"related-programme\" onclick=\"window.open('https:\/\/www.getsmarter.com\/courses\/za\/fundamentals-of-cybersecurity-online-short-course', '_blank')\">\n    <div class=\"row\">\n        <div class=\"col-12 col-md-11\">\n            <div class=\"related-programme__school-logo-container\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/university-of-cape-town\" target=\"_blank\" class=\"related-programme__school-logo-link\">\n                <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2018\/09\/UCT_logo.png\" alt=\"School Logo\" class=\"related-programme__school-logo\">\n            <\/a>\n            <\/div>\n            <div class=\"related-programme__copy\">\n            <a href=\"https:\/\/www.getsmarter.com\/universities\/university-of-cape-town\" target=\"_blank\" class=\"related-programme__school-name\">\n                University of Cape Town (UCT)            <\/a><br>\n            <a href=\"https:\/\/www.getsmarter.com\/courses\/za\/fundamentals-of-cybersecurity-online-short-course\" target=\"_blank\" class=\"related-programme__programme-name\">\n                Fundamentals of Cybersecurity online short course            <\/a>\n            <\/div>\n        <\/div>\n        <div class=\"col-md-1 related-programme__chevron-column\">\n            <div class=\"related-programme__icon-container\">\n                <img decoding=\"async\" class=\"add-btn\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/themes\/blog\/assets\/icn_arrow-circle_right.svg\" alt=\"Read More Icon\">\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware and beyond<\/h2>\n\n\n\n<p>The current fifth phase of cyberattacks is on a much larger scale, and even more invasive than the previous generations. Before \u2018WannaCry\u2019<sup>12<\/sup>&nbsp;was detected in May 2017, we had never heard of the term ransomware. \u2018WannaCry\u2019, a trojan worm that exploited vulnerabilities in the Windows operating system \u2013 came with a two-pronged attack; delivering a self-propagating worm that locked up files in the host computer, as well as a ransom module that handled the ransom extortion activities. Bitcoin was its prefered method of payment, and once paid the files would be released.<\/p>\n\n\n\n<p>One of these fifth generation attacks was carried out against USA\u2019s retailer, Target, and saw the details of over 40 million credit cards hacked through the retailer\u2019s point-of-sale systems.<sup>13<\/sup> The attack was simply too advanced to have been identified or prevented by the industry giants based on the methods they were using at the time.<\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-36-Q4_Infostat02_Desktop_-970px.jpg\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-36-Q4_infographic_Mobile_-400px.jpg\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<h2 class=\"wp-block-heading\">New technology for new challenges<\/h2>\n\n\n\n<p>The big antivirus companies established in the 1990s dominated the cybersecurity industry for nearly two decades, but with the rise of these large, well-organised attacks, new challenges arose, and with it came a demand for more innovative and creative technologies.&nbsp;<span style=\"font-weight: 400;\">The next generation of cybersecurity solutions are increasingly incorporating Artificial Intelligence (AI), machine learning technologies, and deep learning.<sup>15<\/sup><\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.getsmarter.com\/courses\/us\/berkeley-artificial-intelligence-strategy-online-short-course\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Artificial Intelligence (opens in a new tab)\">Artificial Intelligence<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<p>The term AI first appeared in the 1950s<sup>16<\/sup> to describe systems comprising a set of human-defined, \u201cif or then\u201d scenario decision rules. It is typically any system that performs tasks that have some semblance of automated decision-making.<sup>17<\/sup> When used in cybersecurity, AI software analyses raw network activity data and flags unusual connections. This is basic pattern spotting and is fairly rudimentary.<sup>18\u00a0<\/sup>AI can also save analysts and companies from wasting time and money investigating false alerts by its <strong>ability to identify legitimate malicious activity<\/strong>.\u00a0<\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-36-Q4_Infostat_Desktop_-970px.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-36-Q4_infostat_Mobile_-400px.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/www.getsmarter.com\/courses\/us\/mit-machine-learning-online-short-course\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Machine learning (opens in a new tab)\">Machine learning<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<p>Machine learning (ML) is often expressed in the same breath as AI, but where AI is seen as a science, this is more of an approach.<sup>20<\/sup> To learn from collected data, ML uses algorithms for prediction, classification, and insight generation through a formal body of methods grounded in solid mathematical foundations.<sup>21<\/sup> Applied to cybersecurity, the right problems must be matched with the right ML tools.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deep learning<\/strong><\/li>\n<\/ul>\n\n\n\n<p>As a tool within machine learning, deep learning (DL) is highly dependent on matching the right problems to the right tools. Big technology companies like Google, Facebook, Microsoft, and Salesforce have already embedded DL into their products.<\/p>\n<p>When it comes to cybersecurity, DL is proving its superiority over the rule-based and classic ML-based solutions when it comes to malware detection and network intrusion detection.<sup>22<\/sup> Network intrusion detection systems are typically rule-based and signature-based controls that are deployed at the perimeter to detect known threats. Before DL, cyberattackers would get away with changing malware signatures and evading the traditional network intrusion detection systems.<\/p>\n<p>DL is also effective when used to analyse a user\u2019s behaviour over a series of actions in order to determine if something is out of the ordinary in their behaviour, and if a threat actor is using compromised legitimate network credentials, or if it\u2019s an insider threat. For example, an employee accesses a local server that they hardly ever connect to, and suddenly start to download everything off the server. This approach is what is known as behavioural user analytics.<sup>23<\/sup><\/p>\n<p>In any of these cases, these technologies will recognise that there is an anomaly and will alert IT staff for further investigation. Behavioural user analytics is quickly becoming the gold standard for cybersecurity products in the AI domain.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>The next generation of cybersecurity solutions are increasingly incorporating Artificial Intelligence (AI), machine learning technologies, and deep learning. <\/p><\/blockquote><\/figure>\n\n\n\n<p>Another challenge the cybersecurity market is currently facing is the increased focus on data protection since the European Union\u2019s enforcement of the General Data Protection Regulation (GDPR) in 2018.24 As a direct result of this regulation, many businesses are now compelled to implement further cybersecurity measures to keep the personal data of customers and employees safe. While this regulation only applies to companies that handle personal data from the EU, it is already transforming the cybersecurity stance of businesses across the globe.25<\/p>\n<p>As cybersecurity threats continue to evolve and become more complex, the rapidly growing cybersecurity industry faces exciting new challenges as it looks to use cutting-edge cybersecurity detection tools, technology and techniques to fight the ever-present threat of malicious activity to keep user and business information safe.<\/p>\n\n\n\n<div id=\"accordion\">\n<div class=\"card\">\n<div id=\"headingOne\" class=\"card-header\">\n<h6 class=\"mb-0\"><button class=\"btn\" style=\"background-color: transparent;\" data-toggle=\"collapse\" data-target=\"#sources\" aria-expanded=\"true\" aria-controls=\"sources\"> <strong>Click here to view sources<\/strong> <\/button><\/h6>\n<\/div>\n<div id=\"sources\" class=\"collapse\" aria-labelledby=\"headingOne\" data-parent=\"#accordion\">\n<div class=\"card-body\">\n<ul class=\"mx-0\" style=\"list-style: none;\">\n\n<li class=\"mb-4\"><sup>1<\/sup> (2018). \u2018The fascinating evolution of cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.latrobe.edu.au\/nest\/fascinating-evolution-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\"> LA Trobe<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>2<\/sup> Meltzer, T. (Oct, 2009). \u2018From the first email to the first YouTube video: a definitive internet history\u2019. Retrieved from <a href=\"https:\/\/www.theguardian.com\/technology\/2009\/oct\/23\/internet-history\" target=\"_blank\" rel=\"noopener noreferrer\"> The Guardian<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>3<\/sup>  Rosenberger, R. (Nd). \u2018When did the term &#8216;computer virus&#8217; arise?\u2019. Retrieved from <a href=\"https:\/\/www.scientificamerican.com\/article\/when-did-the-term-compute\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Scientific American<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>4<\/sup>  Rosenberger, R. (Nd). \u2018When did the term &#8216;computer virus&#8217; arise?\u2019. Retrieved from <a href=\"https:\/\/www.scientificamerican.com\/article\/when-did-the-term-compute\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Scientific American<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>5<\/sup> MacNeil, J. (Nov, 2018). \u2018The computer virus is born, November 10, 1983\u2019. Retrieved from <a href=\"https:\/\/www.edn.com\/electronics-blogs\/edn-moments\/4437117\/The-computer-virus-is-born--November-10--1983\" target=\"_blank\" rel=\"noopener noreferrer\"> EDN<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>6<\/sup> Kelty, C. (Nd). \u2018The Morris Worm\u2019. Retrieved from <a href=\"https:\/\/limn.it\/articles\/the-morris-worm\/#edn1\" target=\"_blank\" rel=\"noopener noreferrer\"> Limn<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>7<\/sup> Kelty, C. (Nd). \u2018The Morris Worm\u2019. Retrieved from <a href=\"https:\/\/limn.it\/articles\/the-morris-worm\/#edn1\" target=\"_blank\" rel=\"noopener noreferrer\"> Limn<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>8<\/sup> Curtis, T. (Nd). \u2018Computer fraud and abuse act enforcement\u2019. Retrieved from <a href=\"https:\/\/digital.law.washington.edu\/dspace-law\/bitstream\/handle\/1773.1\/1643\/91wlr1813.pdf?sequence=3&amp;isAllowed=y\" target=\"_blank\" rel=\"noopener noreferrer\"> Digital Law<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>9<\/sup>  (Nd). \u2018What does CERT mean?\u2019. Retrieved from <a href=\"https:\/\/www.techopedia.com\/definition\/31003\/computer-emergency-response-team-cert\" target=\"_blank\" rel=\"noopener noreferrer\"> TechoPedia<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>10<\/sup> (Jul, 2016). \u2018Sandboxing definition\u2019. Retrieved from <a href=\"https:\/\/techterms.com\/definition\/sandboxing\" target=\"_blank\" rel=\"noopener noreferrer\"> TechTer<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>11<\/sup> (Nd). \u2018What is an anti-bot?\u2019. Retrieved from <a href=\"https:\/\/www.distilnetworks.com\/glossary\/term\/anti-bot\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Distil Networks<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>12<\/sup> (May, 2017). \u2018Ransom WannaCry\u2019. Retrieved from <a href=\"https:\/\/www.symantec.com\/security-center\/writeup\/2017-051310-3522-99\" target=\"_blank\" rel=\"noopener noreferrer\"> Symantec<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>13<\/sup> McKoy, K. (May, 2017). \u2018Target to pay $18.5M for 2013 data breach that affected 41 million consumers\u2019. Retrieved from <a href=\"https:\/\/www.usatoday.com\/story\/money\/2017\/05\/23\/target-pay-185m-2013-data-breach-affected-consumers\/102063932\/\" target=\"_blank\" rel=\"noopener noreferrer\"> USA Today<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>14<\/sup> Rohlinger, L. (July, 2018). \u2018The evolution of cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.mspinsights.com\/doc\/the-evolution-of-cybersecurity-0001\" target=\"_blank\" rel=\"noopener noreferrer\"> MSP Insights<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>15<\/sup> \u2018Artificial intelligence for cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.aiaa.org\/protocolAI\/\" target=\"_blank\" rel=\"noopener noreferrer\"> American Institute of Aeronautics and Astronautics<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>16<\/sup>  Press, G. (Dec, 2016). \u2018A very short history of AI\u2019. Retrieved from <a href=\"https:\/\/www.forbes.com\/sites\/gilpress\/2016\/12\/30\/a-very-short-history-of-artificial-intelligence-ai\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Forbes<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>17<\/sup> Lin, D. (May, 2018). \u2018Understanding the role of artificial intelligence, machine learning and deep learning in cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.exabeam.com\/information-security\/understanding-the-role-of-artificial-intelligence-machine-learning-and-deep-learning-in-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Exabeam<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>18<\/sup> (Nd). \u2018Artificial intelligence for cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.aiaa.org\/protocolAI\/\" target=\"_blank\" rel=\"noopener noreferrer\"> American Institute of Aeronautics and Astronautics<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>19<\/sup>  Brown, R. (2019) \u2018The evolution of cyber threat intelligence (CTI): 2019 SANS CTI survey . Retrieved from <a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/threats\/evolution-cyber-threat-intelligence-cti-2019-cti-survey-38790\" target=\"_blank\" rel=\"noopener noreferrer\"> SANS Institute<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>20<\/sup>  Polyakov, A. (May, 2018). \u2018Machine learning for cybersecurity 101\u2019. Retrieved from <a href=\"https:\/\/towardsdatascience.com\/machine-learning-for-cybersecurity-101-7822b802790b\" \"=\"\" target=\"\" _blank\"=\"\" rel=\"noopener noreferrer\"> Towards Data Science<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>21<\/sup>  Lin, D. (May, 2018). \u2018Understanding the role of artificial intelligence, machine learning and deep learning in cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.exabeam.com\/information-security\/understanding-the-role-of-artificial-intelligence-machine-learning-and-deep-learning-in-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Exabeam<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>22<\/sup>  Singh, S. (Jul, 2018). \u2018Using the power of deep learning in cyber security\u2019. Retrieved from <a href=\"https:\/\/www.analyticsvidhya.com\/blog\/2018\/07\/using-power-deep-learning-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Analytics Vidhya<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>23<\/sup>  Wang, J. (Jun, 2017) \u2018Deep learning in security\u2019. Retrieved from <a href=\"https:\/\/databricks.com\/session\/deep-learning-in-security-an-empirical-example-in-user-and-entity-behavior-analytics-ueba\" target=\"_blank\" rel=\"noopener noreferrer\"> DataBricks<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>24<\/sup>  (Nd). \u2018The EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 20 years\u2019. Retrieved from <a href=\"https:\/\/eugdpr.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"> EUGDPR<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>25<\/sup>  Bagley, D. (Sep, 2018). \u2018Insight into cybersecurity regulations is critical for today\u2019s board members\u2019. Retrieved from <a href=\"https:\/\/www.law.com\/corpcounsel\/2018\/09\/12\/insight-into-cybersecurity-regulations-is-critical-for-todays-board-members\/?slreturn=20190212073545\" target=\"_blank\" rel=\"noopener noreferrer\"> Law<\/a>.<\/li>\n\n\n\n\n\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity has come a long way since its inception in the 1990s.1&nbsp;In the beginning, hackers were generally considered a nuisance, and their hacks \u2013 which were pretty limited in terms of their scope \u2013 were designed more to cause trouble than harm. When the internet began to take centre stage to businesses, and our lives [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":25895,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[120],"article-format":[],"class_list":["post-25854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-advice","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Detecting Cyberattacks | GetSmarter Blog<\/title>\n<meta name=\"description\" content=\"The cybersecurity industry is ever-changing and detecting cyber attacks has being essential to business success. Discover new technology used for next generation cybersecurity solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detecting Cyberattacks Through the Ever-evolving Cybersecurity Industry\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity industry is ever-changing and detecting cyber attacks has being essential to business success. Discover new technology used for next generation cybersecurity solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-18T09:45:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-10T08:51:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Slot_36_Q4_banner_500x278px-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-detect-a-cyberattack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-detect-a-cyberattack\\\/\"},\"author\":{\"name\":\"Shameel Mohanlal\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/#\\\/schema\\\/person\\\/527df7e5676f2bfa7c943e1653764bff\"},\"headline\":\"Detecting Cyberattacks Through the Ever-evolving Cybersecurity Industry\",\"datePublished\":\"2019-03-18T09:45:10+00:00\",\"dateModified\":\"2023-08-10T08:51:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-detect-a-cyberattack\\\/\"},\"wordCount\":1851,\"image\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-detect-a-cyberattack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Slot_36_Q4_banner_500x278px-copy.jpg\",\"keywords\":[\"Systems &amp; technology\"],\"articleSection\":[\"Career Advice\"],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-detect-a-cyberattack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Slot_36_Q4_banner_500x278px-copy.jpg\",\"contentUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Slot_36_Q4_banner_500x278px-copy.jpg\",\"width\":500,\"height\":278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/how-to-detect-a-cyberattack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Detecting Cyberattacks | GetSmarter Blog","description":"The cybersecurity industry is ever-changing and detecting cyber attacks has being essential to business success. Discover new technology used for next generation cybersecurity solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/","og_locale":"en_US","og_type":"article","og_title":"Detecting Cyberattacks Through the Ever-evolving Cybersecurity Industry","og_description":"The cybersecurity industry is ever-changing and detecting cyber attacks has being essential to business success. Discover new technology used for next generation cybersecurity solutions.","og_url":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/","og_site_name":"GetSmarter Blog","article_published_time":"2019-03-18T09:45:10+00:00","article_modified_time":"2023-08-10T08:51:42+00:00","og_image":[{"width":500,"height":278,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Slot_36_Q4_banner_500x278px-copy.jpg","type":"image\/jpeg"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/#article","isPartOf":{"@id":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/"},"author":{"name":"Shameel Mohanlal","@id":"https:\/\/www.getsmarter.com\/blog\/#\/schema\/person\/527df7e5676f2bfa7c943e1653764bff"},"headline":"Detecting Cyberattacks Through the Ever-evolving Cybersecurity Industry","datePublished":"2019-03-18T09:45:10+00:00","dateModified":"2023-08-10T08:51:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/"},"wordCount":1851,"image":{"@id":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Slot_36_Q4_banner_500x278px-copy.jpg","keywords":["Systems &amp; technology"],"articleSection":["Career Advice"],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Slot_36_Q4_banner_500x278px-copy.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/Slot_36_Q4_banner_500x278px-copy.jpg","width":500,"height":278},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/25854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=25854"}],"version-history":[{"count":201,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/25854\/revisions"}],"predecessor-version":[{"id":50452,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/25854\/revisions\/50452"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/25895"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=25854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=25854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=25854"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=25854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}