Cybersecurity, types, cases and a 600 hour Master

Rare is the week in which we do not read any case related to Cybersecurity in any large company. Leaking data, attacks on servers, theft of information, destroyed disks, mobile phones that open their doors to the public … as technology advances, we deliver more data on systems that, unfortunately, cannot fully protect themselves from the different attacks that can be done.

There are a huge number of attacks on computer systems, threats that, in general, can be classified as follows:

– Denial of service: The famous DDoS, attacks that overload servers or networks with the aim of preventing them from continuing to offer a service. These attacks can be extremely sophisticated, making it virtually impossible to avoid them: if millions of different IP addresses access the same server, it becomes impossible to tell a normal user from an attacking computer. In this case, specific regions or suspicious groups of IP addresses are usually blocked, although there are more sophisticated systems that use statistics to determine what should be blocked. – Man in the middle: The classic situation in which the attacker spreads a communication between two parties and falsifies data to impersonate one of them. – Zero-day attack: Where security holes are sought for specific programs or an issue that has already been made public is exploited. – Brute force attack: Where an attempt is made to enter a system trying to obtain the password by testing all possible combinations.

There are more categories, more groups, and many attacks that are difficult to classify. Just yesterday we saw how a well-known dating website between married people had been attacked, with 34 million data of users stolen (from names to payment systems), although apparently the theft did not have much technological ingredient: someone from support had access to the servers and decided to steal the information.

Creating a secure system does not mean creating a technologically closed wonder, it means creating an information flow and a series of processes that prevent unauthorized access to sensitive data, it means training workers to understand what is security in the world of information. digital, and that's harder than it sounds.

If you want to go deeper into this topic, you can access the Cybersecurity Master organized by, a 600-hour master that begins in October, where cyber defense, cyber attack techniques and forensic analysis of computer systems will be explained. The Master is designed for people with previous experience in programming and software development, as well as knowledge of operating system administration and network administration.