Skip to main content

Training and prevention against the threat ‘hacker ': this is Incibe

Training and prevention against the threat ‘hacker ': this is Incibe


During 2017, 123,064 cybersecurity incidents were registered in Spain, almost 70% of citizens have experienced problems with their computer security, mostly related to spam and malware .It is the data handled by the National Cybersecurity Institute (Incibe).The Internet has expanded our world to unknown limits, but it has also demolished some walls that kept us safe. This is Incibe and thus reinforces our cybersecurity.

Related

What is INCIBE


Collecting data is not the main task of Incibe.The more than 120,000 incidents were not only recorded, but were resolved by this center.Its main function is to "strengthen digital trust, increase cybersecurity and resilience and contribute to digital market so as to promote the safe use of cyberspace in Spain ", as indicated in its normative document.


It is an agency under the Ministry of Energy, Tourism and Digital Agenda.From the Incibe, cybersecurity research is promoted, services are provided and agents with competences in digital security are coordinated, according to its website, this The institute also seeks to boost the ICT sector, support citizens in cybersecurity and generate knowledge about it.


Training and prevention against the threat ‘hacker ': this is Incibe


To this end, Incibe has a number of agencies and centers to address different aspects of cybersecurity:


  • Certsi, or Security and Industry CERT .It is the main Computer Emergency Response Team (CERT) in Spain.Its task is to prevent, mitigate and respond to cyber incidents in companies and operators of critical infrastructure, as well as for citizens.Certsi smokes in situations such as the ransomware WannaCry attack a little over a year ago.

  • OSI, or Office of Internet Security .In relation to the user, information is the best tool to deal with cybersecurity threats.OSI seeks to adopt good habits of security, contribute to the user's awareness of their own responsibility and minimize the number and impact of incidents.

  • Protect your company .This platform is similar to the OSI, but with the aim of helping organizations make safe use of technologies and internet.It includes informative, training and analysis tools , as well as the catalog of registered threats.

Training and prevention against the threat ‘hacker ': this is Incibe


Functions of the National Cybersecurity Institute


A cybersecurity course for SMEs and freelancers.An international meeting for information security.The Cybersecurity Summer BootCamp for state security forces.Advocacy applications such as Hackend and Cyberscouts.Cybersecurity reports and surveys. Action plans for the future .All of them are tools and initiatives developed under the Incibe umbrella.


This institute focuses its work on four major fields:


  • Provision of cybersecurity services , both prevention and reaction.

  • Research promotion to generate innovation and knowledge in cybersecurity.

  • Promotion and detection of talent in industry and academia.

  • Strengthening national and international coordination to achieve faster action.

Although Incibe's work seeks to improve the general levels of cybersecurity, it focuses on four specific groups.A good part of the efforts go to companies and professionals , especially attention to strategic and critical sectors such as energy plants, telecommunications centers or financial markets.In addition, it seeks to improve the training and tools of experts in security .


On the other hand, through the OSI, Incibe provides free information and support services for citizens .Children, youth, families and educators take special attention and count with a specific program called Internet Safe for Kids (IS4K).


Training and prevention against the threat ‘hacker ': this is Incibe


These are the tools of INCIBE


Over the past few years, the National Cybersecurity Institute has developed a multitude of tools, from its own services to platforms for SMEs and self-employed, through a multitude of courses and training activities.These are some of the main tools of Incibe:


  • Antibotnet .This service collects information to know about the existence of a botnet .These remotely controlled computer networks can be used to send spam , DDOS attacks or spreading viruses.It focuses on detecting and alerting systems that are based on a botnet .

Training and prevention against the threat ‘hacker ': this is Incibe


  • AntiRansomware .This service supports an attack by ransomware , with special attention to the business sector.Provides help to detect the attack and resolve it and recommends that deal with possible extortion.

  • Risk analysis .The free tool of self-diagnosis of Incibe allows professionals, SMEs and large companies to make an initial evaluation of cyber risk depending on which technologies are used.

  • Security policies for SMEs. As a guide, Incibe has a series of materials with good security practices for SMEs.They explain how to act and work to reduce risk.employer and employees and cover from how to use the company's smartphone to how to work in the cloud.

  • Cybersecurity catalogs. They are a series of databases updated with the data of the companies that provide security services, the available solutions and the Incibe publications.


Information is power. More than a third of cybersecurity incidents are the product of human failures.Not of malicious attacks from abroad.It occurs because we do not have adequate training.Therefore, good part of the Incibe tools are intended to inform and instruct.For example, the Awareness Kit is an information package prepared for companies to train their employees.In addition, the institute organizes face-to-face workshops, online courses for self-employed and small businesses and develops training apps and even role-playing games on cybersecurity.


The 123,064 incidents registered by Certsi in 2017 represent an increase of 6.77% compared to 2016.From the Incibe, they consider that these numbers could be reduced (or at least slow their increase) with one more society and better formed .Thus, in the 2018 Action Plan, it is specified that the institute will allocate 65% of the budget to cybersecurity, dissemination and awareness services.In round numbers, about 17 million euros.

Images | Incibe, iStock

Comments

Popular posts from this blog

Internet of plants: a tomato knows as much about networks as you

The possibility of plant species communicating through complex networks, what some scientists have called the internet of plants , is an issue that has been discussed for a long time, at least 20 years.It was in 1997 when the scientist Suzanne Simard , from the University of British Columbia in Vancouver (Canada), published a study in the journal Nature on how Forest plants use complex systems where species exchange nutrients, send warning signals and relate to the environment. Although there is no scientific consensus, several investigations seem to support this hypothesis.If confirmed, as we read in a fascinating report by the Sinc Agency, the forests would act as huge structures that are articulated under the soil through a network in which factors invisible to the human eye interact and can determine the future of the climate.Understanding how it works is the challenge that even science faces. internet of plants and the wisdom of forests The premise of Suzanne Simard ...

New setbacks for conspiranoicos: radiofrequencies do not affect health

New evidence published by the Scientific Advisory Committee on Radio Frequency and Health (CCARS) in its 2016 Radio Frequency and Health Report indicates that there are no adverse health effects derived of exposure to radio frequencies emitted by mobile phone antennas or radio and television broadcasting.No evidence has been found on the danger in wireless systems (Wi-Fi) or airport scanners. The new 2016 Radio Frequency and Health Report collects, updates and analyzes the scientific evidence on the subject for the period between January 2013 and June 2016. radio frequencies are not dangerous According to the conclusions of the report " the critical analysis of the evidence supports that there are no technical or sanitary reasons that justify the arbitrary and discretionary imposition of more demanding exposure limits than those recommended by WHO-ICNIRP and the Union European ", while the application of more restrictive limits" would imply increasing the n...

GIF history: where they come from and where they are going

Funny, witty, curious... GIFs have already become a regular resource in social networks and messaging applications and have become part of our daily lives and jokes.It is an image format that has evolved significantly throughout its history and is experiencing a new awakening. In fact, to find its origins, we must go back more than twenty years ago .A moment in which they had little to do with what we know today and an evolution that we could not stop review.So let's find out where they come from and try to catch a glimpse of where they are going. What is a GIF The word GIF responds to the acronym of Graphics Interchange Format , or what is the same, graphic exchange format.A term for the graphic format used in the network for both static images and animations.In more concrete terms, it supports 8 bits per pixel and allows you to display images with up to 256 colors simultaneously-limited by a palette of 16 million-. This particularity makes it a perfect ally of infogr...

Amazon Prime Video arrives in Spain: this is all you need to know

That during the last years there has been a change in the way we enjoy audiovisual content is an obvious reality, as reflected by the huge popularity of streaming services like Netflix and the like.A context in which new competitors are constantly added and that, after the landing of this company in our country just over a year ago, is in full transformation. In fact, today we have learned of the incursion of a new protagonist in this area.Yes, because Amazon Prime Video has just arrived in Spain .A landing that takes place only two weeks away that of HBO, which culminates in a 2016 sown of changes.But, what exactly does it consist of? What advantages and disadvantages does it have compared to the "of its kind"? WHAT AMAZON PRIME VIDEO OFFERS The type, quality and quantity of movies and series offered by the service will be key when determining your success.A catalog a priori smaller than that of HBO and Netflix, but in which we find titles like Seinfield , Into...

What we know and what we suspect in the new Facebook algorithm change

"In my time, we read the newspaper in Facebook ".By 2020, nostalgia has taken over billions of people.In its memory, 2018, when Facebook stopped being Facebook to become Facebook again.Paraiso of engagement for brands and media, land paid for clickbaits and fake news, the social network of Mark Zuckerberg has given a rudder to his algorithm. He wants to return to his origins .And this is what will happen. Related If something goes well, to change it.40.653 million dollars entered in 2017.More than 2.100 million active users per month, a quarter of the world's population.But Zuckerberg is not one of those, of which they are.Want a Facebook with more social connections between people and less presence of brands and media .And what do your users want? Nearly two-thirds of American adults consume news on social networks.More than half do so on their Facebook walls.Pew Research Center data points to a clear trend: Facebook is becoming a media platform.54% of Facebook u...

No kidding: selfitis exists and can be a problem

Sometimes one thinks that social networks were created to share photos of faces putting on little bones and images of dishes overflowing with appetizing foods or, better, of faces putting little bones in front of plates overflowing with appetizing foods in the same shot.is to see faces, faces, faces...all of them smiling, as if looking at the smartphone mirror was the height of happiness.And it does not seem that there are so many beautiful and happy people, or maybe yes, that you go Namely.What envy. Well, what we're going to do: Janarthanan Balakrishnan psychologists from the Thiagarajar School of Management in India; and Mark D.Griffiths, of the Nottingham Trent University, in the United Kingdom, have published an article in the International Journal of Mental Health and Addiction entitled 'A study on' Selfitis', which names this mania of going around the world taking pictures of oneself, as if beyond our curls the world had been destroyed by that meteorite th...

Twitter shows the best of ourselves (it wasn't always going to be the worst)

In the era of social networks, accustomed to interact daily with Facebook, Twitter, Instagram, Google or WhatsApp, we forget that these tools are phenomenal in the History of Humanity capable of mobilize hundreds of thousands of people in very different geographical locations in a matter of hours or even minutes. Already in the past, Twitter has asserted its more social dimension to mobilize people, companies or organizations and also, from a broader perspective, feelings of solidarity and support or also of rejection and repulses towards causes with an important mediatic impact.Recently, Twitter was once again the engine of solidarity after Dortmund's explosions as the Borussia Dortmund team bus passed on its way to the local stadium on the occasion of the Champions League match between the Borussia and the Monaco. These explosions did not have the devastating effect that they could have caused , so that everything remained in a major social commotion at international lev...

Most apps for children violate your privacy

Do you know if apps with which children enjoy their safety? A team of researchers from the International Computer Science Institute (ICSI) of the University of Berkeley has studied compliance with the Online Privacy Protection Act (COPPA) in these mobile applications for the little ones, through a scalable dynamic analysis that allows the automatic evaluation of privacy behaviors of Android apps. After studying 5,855 applications aimed at children, the research concludes that most of these apps, 57%, violate the privacy of their users mainly due to the use of data by third parties. apps for children and privacy Although many apps offer options in their configuration to respect the federal law that protects minors in the United States, by disabling tracking, their results suggest that a majority of applications either do not use these options or propagate them in wrong way. In addition, researchers believe that 19% of apps for children send user IDs to third parties to show ...

Are social networks damaging democracy?

The revelations according to which Russian agents inserted ads on Facebook that tried to influence the 2016 US elections raise a disturbing question: is Facebook bad for democracy? As an expert in the social and political repercussions of technology, I think that the problem is not exclusively from Facebook, but that it is much broader: Social networks are weakening some of the conditions that have historically enabled the existence of national states democratic. I understand that it is a dramatic statement, and I do not expect anyone to believe it immediately, but considering that almost half of all potential voters received false news promoted by the Russians in Facebook is an argument that must be debated. Associate Professor of Philosophy, Director of Center for Professional and Applied Ethics, University of North Carolina-Charlotte How we create a shared reality Let's start with two concepts: the "imagined community" and the "bubble filter". ...

This is how visual challenges star in some of the most viral content

Constantly, we all receive in our mail, our WhatsApp or our Facebook account, games that try to test our ingenuity, imagination or visual skill.There are a thousand types, more fun or darker.But they have one thing in common: we cannot avoid trying them and see if we are able to solve them .This is how the visual challenges star in some of the most viral content of the network. Visual challenges, why are we crazy? The visual challenges are games.So, they attend to this playful and fun part that people have no choice but to feed from time to time.They are pure and hard entertainment, with no more pretensions, and that desire to Having fun represents one of the main features that are sought when surfing the Internet . Another of the qualities for which they succeed is because they challenge the mind directly.Human beings love that feeling of feeling a little troubled, somewhat lost, but convinced that there is a solution to that enigma to which, sooner or later, it will come.Rathe...