Below, various software implementations of Cybersecurity patterns and groups outlining ways a host system attempts to secure itself and its assets from malicious interactions, this includes tools to deter both
passive and active
security threats. Although both security and usability are desired, today it is widely considered in computer security software that with higher security comes decreased usability, and with higher usability comes decreased security.
Prevent access The primary purpose of these types of systems is to restrict and often to completely prevent access to computers or data except to a very limited set of users. The theory is often that if a key, credential, or token is unavailable then access should be impossible. This often involves taking valuable information and then either reducing it to apparent noise or hiding it within another source of information in such a way that it is unrecoverable. •
Cryptography and
Encryption software •
Steganography and
Steganography tools A critical tool used in developing software that prevents malicious access is
Threat Modeling. Threat modeling is the process of creating and applying mock situations where an attacker could be trying to maliciously access data in
cyberspace. By doing this, various profiles of potential attackers are created, including their intentions, and a catalog of potential vulnerabilities are created for the respective organization to fix before a real threat arises. Threat modeling covers a wide aspect of cyberspace, including devices, applications, systems, networks, or enterprises. Cyber threat modeling can inform organizations with their efforts pertaining to cybersecurity in the following ways: • Risk Management • Profiling of current cybersecurity applications • Considerations for future security implementations
Regulate access The purpose of these types of systems is usually to restrict access to computers or data while still allowing interaction. Often this involves monitoring or checking credential, separating systems from access and view based on importance, and quarantining or isolating perceived dangers. A physical comparison is often made to a shield. A form of protection whose use is heavily dependent on the system owners preferences and perceived threats. Large numbers of users may be allowed relatively low-level access with limited security checks, yet significant opposition will then be applied toward users attempting to move toward critical areas. •
Access control •
Firewall •
Sandbox Monitor access The purpose of these types of software systems is to monitor access to computers systems and data while reporting or logging the behavior. Often this is composed of large quantities of low priority data records / logs, coupled with high priority notices for unusual or suspicious behavior. •
Diagnostic program •
Intrusion detection system (IDS) •
Intrusion prevention system (IPS) •
Log management software •
Records Management •
Security information management •
Security event management •
Security information and event management (SIEM)
Surveillance monitor These programs use algorithms either stolen from, or provided by, the police and military internet observation organizations to provide the equivalent of a police
Radio scanner. Most of these systems are born out of
mass surveillance concepts for internet traffic, cell phone communication, and physical systems like
CCTV. In a global perspective they are related to the fields of
SIGINT and
ELINT and approach
GEOINT in the global information monitoring perspective. Several instant messaging programs such as
ICQ (founded by "former" members of
Unit 8200), or
WeChat and
QQ (rumored
3PLA/
4PLA connections) may represent extensions of these observation apparati.
Block or remove malware The purpose of these types of software is to remove malicious or harmful forms of software that may compromise the security of a computer system. These types of software are often closely linked with software for computer regulation and monitoring. A physical comparison to a doctor, scrubbing, or cleaning ideas is often made, usually with an "anti-" style naming scheme related to a particular threat type. Threats and unusual behavior are identified by a system such as a firewall or an intrusion detection system, and then the following types of software are used to remove them. These types of software often require extensive research into their potential foes to achieve complete success, similar to the way that complete eradication of bacteria or viral threats does in the physical world. Occasionally this also represents defeating an attackers encryption, such as in the case of data tracing, or hardened threat removal. •
Anti-keyloggers •
Anti-malware •
Anti-spyware •
Anti-subversion software •
Anti-tamper software •
Antivirus software ==See also==