TOP FIVE CYBER SECURITY THREATS FOR 2012
11 August 2012
ABSTRACT
The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising importance of cyber security at the work place.
These security threats are becoming more common every day. Workplaces and personal lives are being attacked by using smaller more mobile devices. Therefore these cyber threats will be
…show more content…
This in turn can help hackers find out passwords that over all could result in a loss of control of the operations of basic functions within the company (Securities, 2012). To mitigate this use of available site monitoring software should be used to remove any new information about the executives could deter or deflect hackers from building a successful portfolio. Infection is inevitable for a company in this day in age. With some many variables and systems out there a corporation will become infected but the key is to control the infection. To control infection spend an enormous amount of time scanning the servers for unexplained code or files. This will help eliminate code that has been introduced into the system. Another way to mitigate infection overload is to have 24 hour security that will observe and predict new tactics for placing unauthorized code inside the network (Securities, 2012). In this day in age everything that is physical can become digital. All smartphones have cameras that can take pictures that could be used against a corporation especially if they are posted online to a social media site. Hackers can look at a picture that is harmless in nature and pick out possible information from that picture like passwords and usernames posted on cubicle walls. To stop or mitigate this all employees should not have anything on their cubicle walls like
The problem experienced by the Wayward Pines Public Library of having one of their public access computers (PAC) becoming a zombie member of a Botnet army is not an isolated one.
Modern organizations that utilize technology must now use their resources to protect themselves from malicious cybercrime activities. A “hacker” could illegally intrude into an organizations information network and use accounting software to mine information and steal assets at a relatively low risk of being caught.
Times have changed what was known as organized crime has been replaced by Cybercrimes (Heists: Cybercrimes with Ben Hammersley). Cybercrimes have risen dramatically in recent years and have become a major issue the United States and company’s face today jeopardizing as well as threatening the critical infrastructure of America (Cyberwar Threat, 2005). Sadly, the status quo of cyber security is very unstable with the advancements and growth which has put most individuals and businesses into an enormous threat (Agustina, 2015).
The immediate cyber threats to national security has been assessed as high. Cyber security threats are increasing in the number, type and sophistication of the threat. Although a detailed analysis is currently being developed, the ACSC’s Threat Report 2015 predicts the following attributes of cybercrime to increase in the coming decade.
A disgruntled employee smashes his personal computer on the way out. The best counter for these events is to physically secure your IT assets. Keep network servers and other vital infrastructure in a locked computer room with limited access. You can limit access in and out of the office space with perimeter security of some sort (i.e. card swipe for entry), and you can position someone with a clear view of entry points or monitor the area via remote security.
Finally the company should update the employees with the security policies and procedures to prevent the attacks.
The biggest threat or challenge to the Homeland security is the cybersecurity. The attacks on the U.S. Internet infrastructure have intensified over the past few years. The country has not found an effective way to deal with the cyber threats that are currently facing government agencies and private organizations. The main threat is that the attacks cannot only affect software systems but also hardware systems.
-Malicious Software: Computer-savvy criminals have found ways to infiltrate corporate software by simply sending an email to an employee of the company. Enter hacker’s paradise when the employee clicks on an “infected” link inside of the email. The hacker will potentially gain access to client files, corporate documents and account information.
In today's information age, Information Technology (IT) is changing rapidly and a range of cybersecurity vulnerabilities come about. Because of the increases in exploitations, safeguarding personal information and computing resources has become a vital part of the daily operations of organizations. Organizations that use computers have a hugely added advantage over how they do business. Any organization that has a computer system is susceptible to vulnerabilities. In analyzing some the most threatening web vulnerabilities, the conclusion of this essay is that the most critical vulnerability facing IT managers today is humans. This paper will talk about how organizations can secure their businesses to protect their sensitive data.
It is argued by some that installing surveillance system in the workplace is advantageous to the company because the companies need to protect their company assets and trade secrets. This is because electronic surveillance prevents any intrusion, hacking or negative attempts to their computer systems. Indeed, Ball (2010) contends that “they want to protect corporate interests and trade secrets. Email, Internet monitoring and information access control are all deployed against risks of defamation,
It has been proved that computers help a business ease its activities such as record keeping, monitoring employees and word processing among others. However, the use of computers in the workplace breeds concerns such as security threats and privacy issues. Computer systems are not only prone to hackers but also other security issues that may compromise the company’s activities and social integrity. The research will probe into some of the advantages and disadvantages of computer surveillance.
It has been proved that computers help a business ease its activities such as record keeping, monitoring employees and word processing among others. However, the use of computers in the work place breeds concerns such as security threats and privacy issues. Computer systems are not only prone to hackers but also other security issues that may compromise the company’s activities and social integrity. The research will probe into some of the advantages and disadvantages of computer surveillance.
Smart and IoT devices range from mobile phones, televisions, cars, heart monitors and refrigerators. Each of these devices empowers us to simplify and make our lives more convenient. These devices allow us easier access and share data but comes with a certain amount of risk. The increase of smart devices has also increased the number of cyber threats and attacks. The cyber threats that plague these devices are consistently getting more advanced and harder to detect but they consist of Trojans, viruses, botnets, and advanced manipulative devices. Cyber security is an emerging field of Information Technology (IT) that requires a lot of attention but with the growing threats IT professionals need to be well versed in the threats that could
According to the U.S. Department of Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutions for mobile devices are not as broad or high-tech as those for PCs. The majority of mobile security relies on the proper use and smart choices that the user makes on a daily basis to be protected against cyber attacks. Even the most careful person can be attacked but the possibilities of that happening are less when you are proactive.
It has been proved that computers help a business ease its activities such as record keeping, monitoring employees and word processing among others. However, the use of computers in the work place breeds concerns such as security threats and privacy issues. Computer systems are not only prone to hackers but also other security issues that may compromise the company’s activities and social integrity. The research will probe into some of the advantages and disadvantages of computer surveillance.