logo

Cybersecurity Threats and Challenges

   

Added on  2020-02-18

16 Pages3874 Words89 Views
 | 
 | 
 | 
Running head: CYBER SECURITY CHALLENGES0Business Research
Cybersecurity Threats and Challenges_1

CYBER SECURITY CHALLENGES1Table of ContentsIntroduction................................................................................................................................3Project Objective........................................................................................................................4Project Scope..............................................................................................................................4Literature Review.......................................................................................................................5Reason for Cyber Attacks......................................................................................................5Lack of Security.................................................................................................................5Mobile Wallet.....................................................................................................................5Popularity of Social Sites...................................................................................................5Negligence..........................................................................................................................6Cyber Security Challenges for Business....................................................................................6Malware..................................................................................................................................6Inside Risk..............................................................................................................................7Hacktivism.............................................................................................................................7Phishing..................................................................................................................................7Dronejacking..........................................................................................................................8DDoS Attack..........................................................................................................................8The Internet of Things............................................................................................................8Machine Intelligence..............................................................................................................8Recent Cyber Attacks.................................................................................................................9Suggestions for Better Security..................................................................................................9Conclusion................................................................................................................................11References................................................................................................................................12Appendix..................................................................................................................................14
Cybersecurity Threats and Challenges_2

CYBER SECURITY CHALLENGES2List of FiguresFigure 1: Cyber Crimes Attacks...............................................................................................14Figure 2: Increase in Phishing..................................................................................................14Figure 3: Targets of Cyber attacks...........................................................................................15Figure 4: Various Cyber Attack Methods................................................................................15
Cybersecurity Threats and Challenges_3

CYBER SECURITY CHALLENGES3Introduction With the advancement in digital age, the infrastructure of industries is improving as well. Organisations are implementing modern technology in their processes to provide their customers more facilities. Generally, the core of such facilities is the internet based system. The popularity of the internet has provided new opportunities to business, to increase their number of customers by providing better services. Peoples prefer internet based services because it saves time, money and gives more options to consumers. Due to the popularity of its services, hackers are using the internet to attack the data of organisations and persons. Cybercrimes has become a matter of national security in many countries. Many governments are using internet based systems to secure their confidential data and leakage of such data canbe a significant threat to national security. Individuals are also using internet services to communicate and share personal data more thanever. It is important for peoples, companies, and government to protect their data from hackers; therefore, it is necessary to implement cyber security policies. This report will discuss the problems faced by organisations why maintain their cyber security. The report will take the example of cyber-attack on Sony Corporation and other organisations to understand the motives for cyber-attacks and reason of the failure of an organisation to maintain proper security measures.
Cybersecurity Threats and Challenges_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents