14 Feb 2023

122

Cyber Threats: What They Are and How to Protect Yourself

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1622

Pages: 6

Downloads: 0

When people hear about cybersecurity, the two things that come to their minds are computers and viruses. To the ordinary individual, a computer virus may interfere with the normal functioning of their computer. Cybersecurity in modern times is a more complicated and serious issue. Individuals and organizations lose huge amounts of money every day through various forms of cybersecurity threats. The scope of cybersecurity threats in modern times is quite substantial and is only expanding. The continuous use of technology and the constant creation of technological appliances and devices make even more items and individuals vulnerable to cybersecurity threats. Threats can affect the people, outdated computer systems, or the insecurities that come with the numerous ‘Internet of Things’ devices. The paper discusses threats of cybersecurity the fact that it is a constant issue in today’s society. Most people have heard about cybersecurity threats such as computer viruses, spyware threats, hacking, and phishing. Most people are more aware of computer viruses more than any other threat. Simply put, computer viruses are malicious computer programs designed to alter the normal way by which a computer operates without the knowledge or the permission of the user. While most people know some of the ways through a virus may find its way into their computer, it is still not entirely possible for them to avoid viruses. Spyware programs are designed to monitor the online activity of other computers ( Parkinson et al., 2017) . Through such monitoring the malicious individuals can steal personal information and passwords. Hacking can be as simple as logging into another person’s computer if their password is known. Hackers are, however, mostly known to be programmers who can break into other people’s computers remotely and gain, change, or destroy data or information. Phishing has been too common in the recent past, with lots of people and companies reportedly losing valuable data and personal information. At the moment, however, cybersecurity and its threats have become quite an expanded subject with lots of new and unknown threats coming to existence every single day. The most dangerous threats are not exactly the ones that are already known, but the ones people do not see coming. There is no telling how the future of cybersecurity and threats will look like in the near future. The landscape is continuously changing, and the highly skilled cybercriminals are stepping up their game each day and having breakthrough in their vile field of profession. The description of cybersecurity threats is no longer limited to viruses, spyware, hacking and phishing ( Pandey &Misra, 2016) . There are far too many threats in cybersecurity, and millions of users are the globe are victims of more than one form of cybersecurity threats. Below are some of the most common cybersecurity threats today. 

Human Nature 

Cybersecurity threats may present themselves even without malice or the intent to cause damage. Most workplaces today are computerized in the bid to improve efficiency and delivery of services. But this also means there is probably a WIFI network in the workplace for all employees to use. The vulnerability scope is made much bigger in such a situation. Cyber-attack may occur as a result of human error from the employees or lack or cybersecurity awareness where people use passwords that are easy to guess. In such a case, malicious spyware, hacker or phisher can gain important data or information company’s computers. Alternatively, employees or former employees can themselves, become a threat to the organization if they want to gain something by performing malicious actions. These including seeking revenge by former employees or looking to sell crucial information belonging to the organization. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Phishing 

Over seventeen thousand US dollars are lost every single minute due to phishing activities, which makes it the most costly cybercrime in the modern-day. The activity or attack comes in many forms but the idea to elicit crucial data or information from a victim. The information elicited is then used to gain access to personal accounts, network, or get a victim to make money transfers. Some of the most common phishing attacks include CEO fraud, URL phishing, spear-phishing and domain proofing ( Pandey & Misra, 2016) . Cybercriminals who initiate phishing attacks are quite intelligent and convincing. They normally apply social engineering tactics to make their communications appear legitimate to get the attention and trust of the victim. Giant tech companies such as Google and Facebook have both been victims of phishing for which they paid quite dearly. Small businesses, individuals and giant companies can all be vulnerable to phishing attacks. 

Outdated Hardware and Software 

Using outdated technology or computer systems in the modern-day business environment is like having a defense of an army that uses only sticks and knives, for example. The attackers or the enemy, in this case, on the other hand, are heavily armed with the most sophisticated firearms and weapons. Such a defense, therefore, stands no chance against any attack. Outdated machines may not be able to run new or more sophisticated security software. A malicious individual finds much easier to get into an old machine as they are less sophisticated. A system is just as vulnerable is it runs on an outdated operating system or if its security software is outdated. Persons create malicious programs every day, and this means that security programs have to be updated to be able to identify the most recent definitions or malicious files and programs. An outdated operating system or security software will not be able to detect the latest viruses, malware or any other security threats. Using outdated hardware such as old computer systems in a workplace increases vulnerability of data and information and presents as a threat to the whole system or organization. The same goes for the use of outdated software such as operating systems or security software. 

IoT Insecurities 

In modern times, people have expanded the idea of automation by striving to make everything around ‘intelligent’ or smart. The internet of things involves putting together devices, software, sensors, and networks to bring about a self-sustained system in a home or a workplace. A vending machine that orders its own refills fits well in this category. A house that cleans itself, warms itself, or cools itself also fits in the category. The internet of things includes devices, computers, smart doors, electric appliances, smart speakers, health apps, and trackers, among many more items that are connected or can connect in a network ( Weber &Studer, 2016) . The comfort and convenience that these items bring to an individual, a home or a workplace make them quite popular, and their use is believed to expand in the coming years. However, with such a broad scope of connectivity of numerous devices and appliances, the security risks are also enhanced. The higher the number of IoT items in a home or workplace the higher the vulnerability and the higher the risk of cybersecurity threat. 

Man-in-the-middle Attacks 

An attacker may insert themselves into a transaction between two people in the bid of gaining personal or financial information. Such an attacker may tap into a phone line or a network from where they get to listen to or monitor conversations between identified parties. Cybercriminals make this happen by setting up fake public WI-FI, or by installing malware on the computers or networks of their victims. The victims never realize that their conversations are being tapped or monitored by third-parties. 

Why Cybersecurity is a Constant Issue Today 

Technology has affected almost every aspect of human life in modern times. Technology is applicable in health and medicine, education, employment and business, farming, fishing, entertainment, and sports and transportation, among other areas. What allows technology to take over the world is the fact that it makes work much more efficient and life much more comfortable. Also, without the application of technology, one may find themselves extremely behind. Technology has led to the rise of the ‘Internet of Things’ where multiple devices and appliances are connected and made to communicate and work through automation. Mobile phones, tablets, computers, electric appliances, smart door openers and locks, apps, health controllers, smart speakers trackers, and WI-FI all fall under the Internet of Things. The world is continuously becoming smaller virtually with people being able to communicate and conduct business, while far apart, as if they existed in the same location at the same time. It also means individuals invent more advanced technological items each season. While people hugely benefit from technology, computers and computerized devices and appliances, they are also putting their cybersecurity at even higher risks ( Abomhara, 2015) . As long as the world keeps advancing in technology, cybersecurity remains a constant issue. 

Cybersecurity, as a term, came into existence with the creation of computers. In the initial stages of computer and technological developments, the issue was not very common or problematic as it today. However, it has grown to be quite problematic and common in recent decades, given the pace by with people are constantly migrating towards a more digital kind of lifestyle. There is hardly a workplace without computers. Almost every business, whether small or big, utilizes a given aspect of technology or computerization. Wealthy people take it even further by automating or making their homes smart. There are expectations that the number of the internet of things devices will hit twenty billion by the year 2020. At the moment, there is no likelihood that the use or creation of technological devices will stop. Millennials only the life of technology and will only continue to use and create more technological items in the future. But this also means people will expect more advanced cybersecurity threats. Also, the large community of the Internet of Things makes it even much easier for malicious individuals to stage cyber-attacks on victims or organizations. Persons can initiate an attack on smart electronic items, pubic networks, or vulnerable computers and laptops among many other devices ( Abomhara, 2015) . Cyber-attack or cybersecurity threats remains to be an issue in modern times as people use more technological items, and migrate towards a more digital kind of lifestyle. 

Conclusion 

The scope of cybersecurity threat is enormous and continuously expanding and is no longer limited to common threats such as viruses and hacking. The people using computers themselves are a threat to cybersecurity as well as outdated hardware and software. The same can be said for the internet of things devices, which increase the chances of cyber-attacks and system vulnerability. Phishing is quite a dangerous and costly threat to cybersecurity. Any individual, small business, or a multi-national organization is vulnerable. It is safe to conclude that the quick embrace of technology and the rapid migration towards the digital lifestyle has continuously kept alive the issue of cybersecurity. Cyber threats and attacks continue to exist at alarming rates due to the great advancement in technology and the continued and expanded use of computerized devices. 

References 

Parkinson, S., Ward, P., Wilson, K., & Miller, J. (2017). Cyber threats facing autonomous and connected vehicles: Future challenges. IEEE transactions on intelligent transportation systems , 18 (11), 2898-2915. 

Abomhara, M. (2015). Cybersecurity and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility , 4 (1), 65-88. 

Weber, R. H., &Studer, E. (2016). Cybersecurity in the Internet of Things: Legal aspects. Computer Law & Security Review , 32 (5), 715-728. 

Pandey, R. K., &Misra, M. (2016, December). Cybersecurity threats—Smart grid infrastructure. In 2016 National Power Systems Conference (NPSC) (pp. 1-6). IEEE. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Cyber Threats: What They Are and How to Protect Yourself .
https://studybounty.com/cyber-threats-what-they-are-and-how-to-protect-yourself-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration