logo

Cyber Security Threats - Essay

   

Added on  2021-02-20

20 Pages5781 Words129 Views
Individual Essay1

ContentsINTRODUCTION...........................................................................................................................3MAIN BODY..................................................................................................................................3Evolutionary View of Past, Current and future that implication of Security threats and Trend.3Prediction: what is yet to happen and what to look out for in future.........................................10CONCLUSION..............................................................................................................................13REFERENCES..............................................................................................................................142

INTRODUCTIONIn this technology based world, most of the human efforts are now replaced with themachinery and automatized technological advancements. As technology have widened the scopeof users in the form of online market, digital identification and strategic systems which allowsthe growth and sustainability of the many organizations. So in this context the threat to thesecurity will also be focused widely as the criminals get their way towards the manycybercrimes. In computer security, a threat is a possible danger that might exploit a vulnerabilityand confidentiality of the data stored by the user on the internet. This report will help inexploring about email threats and Phishing campaigns that cause a great threat to the security ofthe private and confidential data and information. Along with this, the report will also help in making a clear understanding about variouscommon threats to the cyber security that is Ransomware, Mobile security that protects thepersonal and private data of the user from access to an unauthorised user. This will help inidentifying various cloud security trends that supports large amount of data over the network.This is one of the strongest security which consists of the huge data of the many users as well asmany organizations. Along with this, DDOS (Distributed Denial of service) is also one of thegreat security threat that may responsible for the loss of confidential data and information. Thedocument will also assist the learners about the evolutionary view of the trends which possessthe security to the data (Zhu and et.al., 2018). It will also explore the Implication of the securitythreats and trends to the world. Also with this, various suggestions and predictions will also havebeen explored here. MAIN BODYEvolutionary View of Past, Current and future that implication of Security threats and TrendThe organizations across the world recognise for getting the security right to maintain thecritical success in the large information technology transformation projects. Unfortunately,Cyber threat and attack is too real. In past year, cyber threat may not result in the loss ofintellectual property but it also impacts on the share cost of business and confidence level ofconsumers etc. In this way, it brought the different type of threat which causes the enterprises interms of public embarrassment (Abu and et.al., 2018). For Example- there are large number ofthe element with data loss hack on the 146.5 million people and their accounts. This type ofattack is also known as Equifax Breach. It is one of the most powerful data breach that reported3

by 2021, up from the trillion in 2015. In several areas, it has increased the cyber-crime incidentsand also growing the large number of threats such as denial of service, application and webbased vulnerabilities and persistent threat that carried out through exploits. It is known asvulnerabilities. Threats are coming from the inside of business where it has increased the wide range ofinternal threat from employee who made some simple mistakes. For example- they are losing theUSB and hard drive which targeted the people who loss the credentials by social engineering. Itis directly damaged on the spectrum of malicious software inside that intent on damaging andstealing the enterprise information. It has established the security threats such as ransomwareswhich are the fastest growing. For Example- in 2017, Carbon black put some efforts to increasethe growth rate of underground ransomware economy at high percentage.It is an essential for consumer experience to improve the risk through cyber security.Many hackers are trying to hack the information through website and corporate system.Nowadays, the business and corporate world around would suffered many type of data breaches.A single potential data leak was affecting the overall financial and marketing position of business(Benson McAlaney and Frumkin, 2019). It also involves the exposure of database that containvarious type of personal information records of consumer, import-export and business relateddetails. It is the biggest trend that emerge in the recent years to identify the management and itsspecific role. Email is basically the primary mode of enterprises and personal communication whichdespite to increase the messaging through application and other social media tools. These are theefficient technique and method for increasing the demand of consumer in global marketplace.The volume of email is increasing with the proportion of different type of Spam emails. Email iscontinually major attack on the vendors with the malicious emails the weapon as per choice. Inpast year, Multiple hackers may use the technique to effect on the enterprises process. Malwareis also becoming more sophisticated that increasing the advancement of phishing campaign(ChoiShin and Cho, 2018). It is easy for detect the threats in the system. Hacker can use themalware software such as ransomware, adware and spyware etc. These are different type ofsoftware that enter in the system to perform the multiple action on the processing of hardware. Inpast year, hacker can use the multiple software to damage the sensitive information. On the other hand, Phishing is also another technology that can be used to loss the4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Telstra Security Report 2018: Evaluating the Trend of IoT Devices and Legal Considerations
|13
|5530
|281

Cyber Security Law, Regulation and Policy
|14
|5098
|429

Cyber Law 2 INTRODUCTION
|16
|5193
|369

Cyber Security And Web Attacks Assignment
|22
|6545
|16

Deep Learning Framework for Cyber Attack Prediction
|12
|2842
|59

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375