Cyber Security and Cryptocurrency: Emerging Technologies Report

Verified

Added on  2023/02/01

|4
|741
|25
Report
AI Summary
This report analyzes the interconnectedness of cyber security and cryptocurrency, focusing on the vulnerabilities and threats associated with emerging technologies. The report begins by exploring different hacking methodologies, including the distinctions between white hat, black hat, and grey hat hackers. It then delves into the security risks posed by the Internet of Things (IoT), highlighting how the dependence on these devices can lead to data breaches and privacy violations. The report also examines the functioning of cryptocurrency, specifically Bitcoin, discussing its role in business transactions and its inherent vulnerabilities. The report emphasizes the critical need for robust security measures to protect user data, addressing the ethical concerns of IT giants' data usage, and proposing security controls such as secured authorization processes and performance monitoring to mitigate risks. The report references works by Bucak (2015), and videos about hackers, IoT, and cryptocurrencies to support its analysis.
Document Page
Running head: CYBER SECURITY AND CRYPTO CURRENCY
CYBER SECURITY AND CRYPTO CURRENCY
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY AND CRYPTO CURRENCY
The first video is regarding the hacking and the functionality of the hackers. The way of
hacking and the significance of the hackers are described in this context. It has been seen that
there are three types of hackers- white hat, black hat and grey hat. Each type of hackers has
different approach towards hacking the devices.
The second video is regarding the breaching of the information through the internet of
things. It has been seen that most of the users are dependent on the use of the internet of things
nowadays (Hackers., 2019). However, breaching of the personal data that also includes the
account number and the email id password can be done through the hacking of the internet of
things devices.
The third video is regarding the use of crypto currency. The video has described the
functioning of the crypto currency that also includes the transaction through the crypto currency.
Apart from that the business dealing through the cryptocurrency has also described in this video.
Though the main focus is on the one type of crypto currency which is bitcoin.
The main issues regarding the use of the technology is that every emerging technologies
are vulnerable and there is a way for breaching the data with the use of technology. The
breaching of the data through the use of technology is serious problem for the users (IoT., 2019).
It has been seen that some of the IT giants are also using the user data in such a way that is not
ethical. In this context, the testimonial of Edward Snowden can be mentioned.
The breaching of the data is affecting both the individuals and the society. In case, if the
data of the individual are stolen by the hackers, the activity of that person can be tracked
(Bucak,2015). Apart from that his or her personal information can be used in a wrong way which
can be life threatening. It has been notices that the IT giants like Google, Facebook are using
Document Page
2CYBER SECURITY AND CRYPTO CURRENCY
user data for commercial purpose. This is making the life of the individuals exposed and the
privacy along with the choice of living for the people in the society are affected negatively.
People are getting dependent on the digital technology. The excessive use of the internet
of things are making the daily life of the people easier. However, it has been seen that with the
innovation of the emerging technologies, there is a lack of internet security which is a driving
force of these technologies (TedX., 2019). The lack of security is increasing the vulnerability of
the system.
The use of technology can solve different problem like accessing home devices from
outside of the home. Apart from that the use of the free internet has helped the people to stay
connect when they are at home or offices. All these advantages of the technology cannot be
denied.
Due to the prevention of the certain vulnerabilities those can happen to the smart system,
some of the security control can be imposed on the using of these technologies. This can include
the secured authorization process before accessing devices. The monitoring of the performance
of the secured devices can be done through different security measures.
Document Page
3CYBER SECURITY AND CRYPTO CURRENCY
References
Bucak, I. O. (2015). An Extended Human Threats Taxonomy To Identify Information Security
Breaches. Proc. Advances in Computing, Electronics and Communication (ACEC 2015),
31-36.
Hackers, H. (2019). 21st Century Hackers - Documentary 2018. Retrieved from
https://www.youtube.com/watch?v=koi54cPRlhQ
IoT, I. (2019). Internet of Things: Are Smart Devices Helping or Harming? | Rose Barker |
TEDxSalem. Retrieved from https://www.youtube.com/watch?v=ipdTLJcIkWI
TedX, T. (2019). Cryptocurrencies | Gopi Devaraaj | TEDxSKCET. Retrieved from
https://www.youtube.com/watch?v=J16n_HyQaYk
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]