Cyber Security Issues in Modern Times
VerifiedAdded on 2023/01/10
|11
|2481
|97
AI Summary
This document discusses the importance of cyber security in modern times and explores the various threats faced in different sectors such as manufacturing, healthcare, national security, financial sector, and tourism industry. It highlights the need for organizations to adopt proper measures to decrease these threats and protect sensitive information.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY ISSUES IN MODERN TIMES
Cyber Security Issues in Modern Times
Name of the Student
Name of the University
Author Note
Cyber Security Issues in Modern Times
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER SECURITY ISSUES IN MODERN TIMES
Table of Contents
Introduction................................................................................................................................2
Cyber security threats in Manufacturing................................................................................3
Cyber security threats in Healthcare......................................................................................4
Cyber security threat in national security...............................................................................4
Cyber Security Threats in Financial Sector...........................................................................5
Cyber Security Threats in Tourism Industry..........................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................8
Table of Contents
Introduction................................................................................................................................2
Cyber security threats in Manufacturing................................................................................3
Cyber security threats in Healthcare......................................................................................4
Cyber security threat in national security...............................................................................4
Cyber Security Threats in Financial Sector...........................................................................5
Cyber Security Threats in Tourism Industry..........................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................8
2CYBER SECURITY ISSUES IN MODERN TIMES
Introduction
Cyber security is an important concept that has gained prominence in the present
times. It is an emerging issue that has to be dealt at the global level as the web of technology
is expanding. It is the use of techniques that are designed for the protection of different
networks, devices and designs that are regarded as patent of one organization. It is the
technique of the providing security to the crucial information that an organization possesses.
The other term used for referring to cyber security is information technology security. It
holds an eminent place in various organizations as they are used for the protection of
sensitive data (Von Solms & Van Niekerk, 2013). The governing organizations, military
organizations, financial bodies as well as medical organizations are the eminent ones that
utilize networking techniques to protect confidential information. The devices that are used in
providing treatment utilizes the new and advanced techniques that requires the use of data
collection to provide efficient treatment to the patients. The data of the patients is sensitive in
many cases and requires that it should not be shared with anyone other than the doctors. If the
information is not secure that will lead to unauthorized access posing a threat to the personal
information. The information can be used by people indulged in malpractices to cause
potential harm to them. Organizations transfer sensitive data by using the web of networks
that are prone to cyber-attacks that can lead to the theft of intellectual property. The theft of
intellectual property can inflict losses on the company leading to negative impact on the
growth of the company. The military organizations store information in technologically
advanced devices that consist the data of national security. The information is essential to
maintain the security of the nation and is prone to threat. The increase in the transfer of data
by using technologically advanced devices has increased the chances of risk faced by the
organizations all over the world (Craigen, Diakun-Thibault & Purse, 2014). The focus of this
Introduction
Cyber security is an important concept that has gained prominence in the present
times. It is an emerging issue that has to be dealt at the global level as the web of technology
is expanding. It is the use of techniques that are designed for the protection of different
networks, devices and designs that are regarded as patent of one organization. It is the
technique of the providing security to the crucial information that an organization possesses.
The other term used for referring to cyber security is information technology security. It
holds an eminent place in various organizations as they are used for the protection of
sensitive data (Von Solms & Van Niekerk, 2013). The governing organizations, military
organizations, financial bodies as well as medical organizations are the eminent ones that
utilize networking techniques to protect confidential information. The devices that are used in
providing treatment utilizes the new and advanced techniques that requires the use of data
collection to provide efficient treatment to the patients. The data of the patients is sensitive in
many cases and requires that it should not be shared with anyone other than the doctors. If the
information is not secure that will lead to unauthorized access posing a threat to the personal
information. The information can be used by people indulged in malpractices to cause
potential harm to them. Organizations transfer sensitive data by using the web of networks
that are prone to cyber-attacks that can lead to the theft of intellectual property. The theft of
intellectual property can inflict losses on the company leading to negative impact on the
growth of the company. The military organizations store information in technologically
advanced devices that consist the data of national security. The information is essential to
maintain the security of the nation and is prone to threat. The increase in the transfer of data
by using technologically advanced devices has increased the chances of risk faced by the
organizations all over the world (Craigen, Diakun-Thibault & Purse, 2014). The focus of this
3CYBER SECURITY ISSUES IN MODERN TIMES
paper will be on the cyber security threats that are experienced all over the world in present
times.
Cyber security is a vast network that encompasses all the organizations and their
activities. It aims to provide network security, application security, data security, database
security and many more. The risks faced in the sphere of cyber security are challenging as
they are constantly changing with the advancements in the technological sphere. In the earlier
times it was possible to protect the information as the threats faced by the organizations were
known but the situation is different in present times. The technological advancements have
led to the increase in the threats faced and the severity of the issues has increased. The
organizations should adopt ethical practices to decrease the issues faced that are constantly
rising in the present times.
Cyber security threats in Manufacturing
Cyber security threats in the manufacturing process is the common issue that has been
reported in the sphere of industries and corporations. As the competition is increased amongst
the companies it creates chances that the information will be stolen by other companies.
Networking machinery involves the use of computers including software that increase the
productivity of the company. With increase of using the technology in the company the risks
are also increasing. It has been highlighted that the companies who are smaller in scale are
prone to face cyber security threats that includes the breach of data (Wells et al., 2014). It has
been reported that 50 percent of the companies that operate on smaller levels are prone to
face cyber threats. The manufacturing sector is not the only one that is exposed to cyber
threats but it includes the non-financial organizations and also those who do not use the
technological advanced techniques. In the manufacturing sector the breach of data means to
cause disruption in the operation activities. That can cause damages to the property of the
paper will be on the cyber security threats that are experienced all over the world in present
times.
Cyber security is a vast network that encompasses all the organizations and their
activities. It aims to provide network security, application security, data security, database
security and many more. The risks faced in the sphere of cyber security are challenging as
they are constantly changing with the advancements in the technological sphere. In the earlier
times it was possible to protect the information as the threats faced by the organizations were
known but the situation is different in present times. The technological advancements have
led to the increase in the threats faced and the severity of the issues has increased. The
organizations should adopt ethical practices to decrease the issues faced that are constantly
rising in the present times.
Cyber security threats in Manufacturing
Cyber security threats in the manufacturing process is the common issue that has been
reported in the sphere of industries and corporations. As the competition is increased amongst
the companies it creates chances that the information will be stolen by other companies.
Networking machinery involves the use of computers including software that increase the
productivity of the company. With increase of using the technology in the company the risks
are also increasing. It has been highlighted that the companies who are smaller in scale are
prone to face cyber security threats that includes the breach of data (Wells et al., 2014). It has
been reported that 50 percent of the companies that operate on smaller levels are prone to
face cyber threats. The manufacturing sector is not the only one that is exposed to cyber
threats but it includes the non-financial organizations and also those who do not use the
technological advanced techniques. In the manufacturing sector the breach of data means to
cause disruption in the operation activities. That can cause damages to the property of the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4CYBER SECURITY ISSUES IN MODERN TIMES
company that will inflict higher amount of costing in the process of repairing the damages
caused. The internet of things is the main instrument used by the attackers to cause damage to
the companies. Using the information of other companies is deemed illegal by law but still
the competitors engage in illegal practices to increase their efficiency.
Cyber security threats in Healthcare
In the healthcare industry faces threat by the cyber criminals who hack the data that
includes the information about the critical healthcare issues by the patients. This leads to the
breach of data of the patient’s privacy. It is one of the ethics that are to be followed by the
healthcare professionals. The attacks that occur in healthcare sector disrupts the process of
treatment given provided to the patients. In other sectors cyber threat refers to the financial
loses but in the healthcare industries the challenges have more adverse effects. The disruption
that is caused in the sphere of healthcare can lead to the loss of life in the healthcare sphere.
The cyber security threats has caused ransom ware in healthcare industry that led to
victimization of many patients. It is the practice that corrupts the system and leads to the
disruption of the systems unless the ransom amount is paid. This leads to the healthcare
services being unavailable for a longer period of time and can slow down the process of
treatment. It can cause hindrances in the operations systems that increases the cost that affects
the process of development. They can corrupt the software by sending phishing mails,
malicious user links and by sending advertisements that contain malicious components. The
technique of sending these advertisements is known as malvertising. This is a new and
emerging trend on social platforms that the hospitals use for their promotional activities. The
unintentional access to these links can cause threat to the system of healthcare.
company that will inflict higher amount of costing in the process of repairing the damages
caused. The internet of things is the main instrument used by the attackers to cause damage to
the companies. Using the information of other companies is deemed illegal by law but still
the competitors engage in illegal practices to increase their efficiency.
Cyber security threats in Healthcare
In the healthcare industry faces threat by the cyber criminals who hack the data that
includes the information about the critical healthcare issues by the patients. This leads to the
breach of data of the patient’s privacy. It is one of the ethics that are to be followed by the
healthcare professionals. The attacks that occur in healthcare sector disrupts the process of
treatment given provided to the patients. In other sectors cyber threat refers to the financial
loses but in the healthcare industries the challenges have more adverse effects. The disruption
that is caused in the sphere of healthcare can lead to the loss of life in the healthcare sphere.
The cyber security threats has caused ransom ware in healthcare industry that led to
victimization of many patients. It is the practice that corrupts the system and leads to the
disruption of the systems unless the ransom amount is paid. This leads to the healthcare
services being unavailable for a longer period of time and can slow down the process of
treatment. It can cause hindrances in the operations systems that increases the cost that affects
the process of development. They can corrupt the software by sending phishing mails,
malicious user links and by sending advertisements that contain malicious components. The
technique of sending these advertisements is known as malvertising. This is a new and
emerging trend on social platforms that the hospitals use for their promotional activities. The
unintentional access to these links can cause threat to the system of healthcare.
5CYBER SECURITY ISSUES IN MODERN TIMES
Cyber security threat in national security
Nations are constantly facing threats in the security sphere in the present times. It acts
as a threat to the whole population of the nations. The issues are currently increasing as the
sensitive data is exposed to the terrorists who are a potential threat to the security and
prosperity of the nations. The recent incidents that are reported show that a lot of information
is stored on the cyber places that shows the leakage of data that is of national importance. The
incident of data breach by Edward Snowden shows the importance of data for national
security (Carr, 2016). The term securitization surfaced for the first time when issues
regarding to national security were faced. The sphere of national security is the one that
requires immediate attention and action from the governing bodies of the respective
countries. The measures of the security threats are to bed managed by the national
administrators. With the inclusion of nuclear powers in the military strengths national
security is becoming vulnerable. The data including the nuclear information is prone to the
hacking as it is of national importance (Luiijf, Besseling & De Graaf, 2013). The hackers can
be the potential criminals that include terrorists and agents of other nations who are posing
threat to the security. Thus, it can be shown that national security is of immense importance
and the data has become easily accessible with the use of technological advancements.
Cyber Security Threats in Financial Sector
In the financial sector, the risks are constantly increasing as the sphere is expanding.
The incidents reported in financial sector are theft of identity, account takeover, synthetic
fraud, ransom ware and social engineering. The information of the individuals who hold
accounts in the financial service sectors is available on the database. The database can be
easily accessed when the incidents of cyber breach occur. The credit history is also available
that show the financial statements that can cause financial fraud (Arachchilage & Love,
2014). The breach of personal information can cause theft of identity that can cause harm to
Cyber security threat in national security
Nations are constantly facing threats in the security sphere in the present times. It acts
as a threat to the whole population of the nations. The issues are currently increasing as the
sensitive data is exposed to the terrorists who are a potential threat to the security and
prosperity of the nations. The recent incidents that are reported show that a lot of information
is stored on the cyber places that shows the leakage of data that is of national importance. The
incident of data breach by Edward Snowden shows the importance of data for national
security (Carr, 2016). The term securitization surfaced for the first time when issues
regarding to national security were faced. The sphere of national security is the one that
requires immediate attention and action from the governing bodies of the respective
countries. The measures of the security threats are to bed managed by the national
administrators. With the inclusion of nuclear powers in the military strengths national
security is becoming vulnerable. The data including the nuclear information is prone to the
hacking as it is of national importance (Luiijf, Besseling & De Graaf, 2013). The hackers can
be the potential criminals that include terrorists and agents of other nations who are posing
threat to the security. Thus, it can be shown that national security is of immense importance
and the data has become easily accessible with the use of technological advancements.
Cyber Security Threats in Financial Sector
In the financial sector, the risks are constantly increasing as the sphere is expanding.
The incidents reported in financial sector are theft of identity, account takeover, synthetic
fraud, ransom ware and social engineering. The information of the individuals who hold
accounts in the financial service sectors is available on the database. The database can be
easily accessed when the incidents of cyber breach occur. The credit history is also available
that show the financial statements that can cause financial fraud (Arachchilage & Love,
2014). The breach of personal information can cause theft of identity that can cause harm to
6CYBER SECURITY ISSUES IN MODERN TIMES
the individual. The online account opening and the verification process creates the threats to
the identity of the individuals. This creates the friction in the information that is consisted in
the database that sometimes leads to financial fraud and abandoning the legitimate customers.
The technique used to take over the account of another person helps in obtaining the identity
and using the financial gains from the other person’s account. The technique to obtain the
access to the email that is registered with the banks helps the hackers to gain access to the
baking details. These help in taking over the account of that person and utilizing it without
his consent. These security system attacks are likely to be experienced from those individuals
who are closely associated and these type of issues go undetected as the fraud happens from
authentic accounts. Synthetic fraud is the new technique used by the hackers who create
fictitious identity using real information. The impact of synthetic fraud is immediately
experienced by the financial organization but the long term issues are faced by the individual
whose identity is being taken. The fictitious identity holders behave like authentic customers
and use the finances in the veil of a fake identity. Ransom ware is the most common problem
faced by many organizations that use new technologies. This includes the use of infecting the
software system by creating a malicious software that disrupts the functioning of the systems
and leaves the system affected. The financial organizations need vow to maintain the data
related to the customers and the ransom ware leads to the exposure of data to criminals.
Social engineering is the system that implores the weakness of the individuals and is used to
access the network of the organizations. It is a technique to trick the employees and divulged
the information from them. These can happen with the utilization of phone calls, spam mails
and snail mail. This shows that the need to provide necessary training to the employees to
avoid and detect the practices that are the threat to the organizations.
the individual. The online account opening and the verification process creates the threats to
the identity of the individuals. This creates the friction in the information that is consisted in
the database that sometimes leads to financial fraud and abandoning the legitimate customers.
The technique used to take over the account of another person helps in obtaining the identity
and using the financial gains from the other person’s account. The technique to obtain the
access to the email that is registered with the banks helps the hackers to gain access to the
baking details. These help in taking over the account of that person and utilizing it without
his consent. These security system attacks are likely to be experienced from those individuals
who are closely associated and these type of issues go undetected as the fraud happens from
authentic accounts. Synthetic fraud is the new technique used by the hackers who create
fictitious identity using real information. The impact of synthetic fraud is immediately
experienced by the financial organization but the long term issues are faced by the individual
whose identity is being taken. The fictitious identity holders behave like authentic customers
and use the finances in the veil of a fake identity. Ransom ware is the most common problem
faced by many organizations that use new technologies. This includes the use of infecting the
software system by creating a malicious software that disrupts the functioning of the systems
and leaves the system affected. The financial organizations need vow to maintain the data
related to the customers and the ransom ware leads to the exposure of data to criminals.
Social engineering is the system that implores the weakness of the individuals and is used to
access the network of the organizations. It is a technique to trick the employees and divulged
the information from them. These can happen with the utilization of phone calls, spam mails
and snail mail. This shows that the need to provide necessary training to the employees to
avoid and detect the practices that are the threat to the organizations.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7CYBER SECURITY ISSUES IN MODERN TIMES
Cyber Security Threats in Tourism Industry
With the advancements in the tourism sector, the data available on the platforms is
becoming the center of attraction for the criminals. The individual details required to fulfill
the necessary criteria to obtain the documents for travel purposes is available that attracts the
interest of the criminals. The vulnerability of the information is not kept in mind while
sharing in the information. The recent attacks happening in the tourism industry show that the
patterns that were earlier followed by the criminals as increased in frequency. They are the
favorable targets as they deal with a large amount of information. The tourism industry
envisages the attention to the physical security and thus places a large amount of focus on it.
During this process they neglect the aspect of providing security in the cyber place. The
threats can largely incur financial issues faced by the companies managing the tourism affair
as well the tourists. These can hamper the services provided by the company and lead to
losses. The personal data holds importance for the customers and any potential loss can pose
a threat to their personal lives. Thus it becomes the duty of the organizations to maintain the
privacy of the customers that can help in the development of a secure feeling on the
organization (Kogiso & Fujita, 2015). This can increase the trust and help to increase the
business of the company.
Conclusion
Thus, it can be concluded from the information stated above that the risks inflicted by
the cyber security are varied. They have posed threat to each and every sector that is
highlighted in the fact stated above. The industries related with the manufacturing process,
healthcare, finance and tourism have witnessed the incidents of cyber threats. This shows that
the sectors are increasingly facing the issues and it poses threat to them. The organizations
should adopt proper measures to decrease the threats that are experienced. This will decrease
Cyber Security Threats in Tourism Industry
With the advancements in the tourism sector, the data available on the platforms is
becoming the center of attraction for the criminals. The individual details required to fulfill
the necessary criteria to obtain the documents for travel purposes is available that attracts the
interest of the criminals. The vulnerability of the information is not kept in mind while
sharing in the information. The recent attacks happening in the tourism industry show that the
patterns that were earlier followed by the criminals as increased in frequency. They are the
favorable targets as they deal with a large amount of information. The tourism industry
envisages the attention to the physical security and thus places a large amount of focus on it.
During this process they neglect the aspect of providing security in the cyber place. The
threats can largely incur financial issues faced by the companies managing the tourism affair
as well the tourists. These can hamper the services provided by the company and lead to
losses. The personal data holds importance for the customers and any potential loss can pose
a threat to their personal lives. Thus it becomes the duty of the organizations to maintain the
privacy of the customers that can help in the development of a secure feeling on the
organization (Kogiso & Fujita, 2015). This can increase the trust and help to increase the
business of the company.
Conclusion
Thus, it can be concluded from the information stated above that the risks inflicted by
the cyber security are varied. They have posed threat to each and every sector that is
highlighted in the fact stated above. The industries related with the manufacturing process,
healthcare, finance and tourism have witnessed the incidents of cyber threats. This shows that
the sectors are increasingly facing the issues and it poses threat to them. The organizations
should adopt proper measures to decrease the threats that are experienced. This will decrease
8CYBER SECURITY ISSUES IN MODERN TIMES
the chances of breach of information. Thus, it becomes a necessity to adopt proper measures
while dealing with the issues of cyber security.
the chances of breach of information. Thus, it becomes a necessity to adopt proper measures
while dealing with the issues of cyber security.
9CYBER SECURITY ISSUES IN MODERN TIMES
References
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing
threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
Carr, M. (2016). Public–private partnerships in national cyber-security
strategies. International Affairs, 92(1), 43-62.
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology
Innovation Management Review, 4(10).
Kogiso, K., & Fujita, T. (2015, December). Cyber-security enhancement of networked
control systems using homomorphic encryption. In 2015 54th IEEE Conference on
Decision and Control (CDC) (pp. 6836-6843). IEEE.
Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security
strategies. International Journal of Critical Infrastructures 6, 9(1-2), 3-31.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security
challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.
References
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing
threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
Carr, M. (2016). Public–private partnerships in national cyber-security
strategies. International Affairs, 92(1), 43-62.
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. Technology
Innovation Management Review, 4(10).
Kogiso, K., & Fujita, T. (2015, December). Cyber-security enhancement of networked
control systems using homomorphic encryption. In 2015 54th IEEE Conference on
Decision and Control (CDC) (pp. 6836-6843). IEEE.
Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security
strategies. International Journal of Critical Infrastructures 6, 9(1-2), 3-31.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security
challenges in manufacturing systems. Manufacturing Letters, 2(2), 74-77.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10CYBER SECURITY ISSUES IN MODERN TIMES
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.