18 Jun 2022

402

Dealing with Cybersecurity Threats amid the Covid Pandemic

Format: APA

Academic level: University

Paper type: Essay (Any Type)

Words: 677

Pages: 2

Downloads: 0

The problem 

Cybersecurity attacks have seen a sharp increase since the Covid-19 pandemic hit the world. Such threats as hacks, scams malicious links, malware attacks and spam messages were reported in high numbers during this one-year period. More than 900,000 spam messages, 48,000 malicious links and 737,000 malware attacks have been reported since April 2020 ( Khan et al., 2020) . It is important to identify who is affected by the cybersecurity threats, current and prospective solutions and expected barriers to these solutions. 

Who is Affected? 

Cybersecurity threats are affecting individuals, businesses and institutions across the board. Government institutions, despite the high-level protective strategies they have in place, are also victims of these threats. Health care systems, individual businesses, personal assets and financial institutions such as banks accessible on the internet are affected by cybersecurity threats during this period of the pandemic. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The Degree of Consequence 

Issues like hacking can shut down or delay the advancement of businesses. All problems associated with these threats result in immense losses including information and money. Therefore, the degree of consequence as instigated by the problem ranges from the loss of a small amount of information, to huge amounts of data and billions of dollars. 

Current and Prospective Technological Solutions 

As an issue founded in technological advancement, cybersecurity threats are well-addressed through technological solutions. One of the foundational solutions is access controls and password security ( Reddy & Reddy, 2014) . It is the primary protective strategy used at the individual level to protect one’s information. Nonetheless, recent times have seen cybersecurity criminals bypass this strategy. Various software is in place to assure cyber protection at the individual and organization level. Such software are malware scanners which scan files and data any system to help detect harmful viruses or malicious code ( Reddy & Reddy, 2014) . Firewalls are also software used in protection against cybersecurity threats. They are a program or hardware that help screen and lockout viruses, worms and hackers. Anti-viruses are computer programs that identify, prevent and eliminate malicious programs, codes, viruses, worms and hackers. 

Prospective cybersecurity solutions include the use of Artificial Intelligence (AI). International Business Machines Corporation (IBM) is one of the organization cognizant of the place of AI in cybersecurity and spearheading advancements in the area. The organization identifies that AI has the potential to analyze massive amounts of data in short periods meaning that it can detect cybersecurity threats in real time. It also has the potential to predict such threats meaning that preventative measures will be put in place beforehand. User-behavior analytics (UBA) are also prospective solutions to the problem ( Sandar et al., 2019) . UBAs detect unusual behavior in organizations, one that is different from the normal user, especially when there is suspicion of a hack. Organizations can detect anomalies in user behavior and implement protective strategies. Many organizations are gradually shifting to cloud computing which allows them to store data without direct involvement by the user. Such a strategy would mean that any user, including hackers have no access to data. 

Expected Constrains 

Some constrains in cybersecurity include issues of ethics where there are questions on how ethical it would be to use such technologies including AI in cybersecurity. Ethical issues include the concern for privacy and issues of discrimination ( Siau & Wang, 2020) . Such technologies may be used to breach privacy and conduct unwarranted surveillance. Another constrain is the questionable accuracy of these technologies. Many of these technologies are currently being used in cybersecurity but people and organizations still experience threats and attacks. Therefore, many of these technologies do not seem as accurate as expected. Some of these technologies may not be easily accessed by everyone. Technologies such as AI or cloud computing may only be reserved for those who can afford and have them integrated into their systems. 

Design challenge Variants 

One variant to the design challenge is development and easy access to educational resources on cyberthreats and strategies for protection. Such resources are greatly limited, and this contributes to the spread of the problem. Another variant is that the identified strategies need to be simplified as many individuals may not understand the codes used to explain them. The third variant is planning, which will ensure early preparation when cyberthreats are concerned. It includes having strategies to deal with these threats before they can cause any harm for the individual or business. 

References 

Khan, N., Brohi, S., & Zaman, N. (2020). Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic. https://doi.org/10.36227/techrxiv.12278792.v1 

Reddy, G. N., & Reddy, G. J. (2014). A study of cyber security challenges and its emerging trends on latest technologies.  arXiv preprint arXiv:1402.1842

Sandar et al. (2019). Fundamental Areas of Cyber Security on Latest Technology.  International Journal of Trend in Scientific Research and Development (IJTSRD) 3 (5). 

Siau, K., & Wang, W. (2020). Artificial intelligence (AI) ethics: ethics of AI and ethical AI.  Journal of Database Management (JDM) 31 (2), 74-87. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Dealing with Cybersecurity Threats amid the Covid Pandemic.
https://studybounty.com/dealing-with-cybersecurity-threats-amid-the-covid-pandemic-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

How AI Can Help Retailers Solve Business Problems

The global marketplace is currently more integrated than ever before. This situation presents a never-before experienced opportunity for retailers. Multinational organizations whose sole basis is the internet have...

Words: 2700

Pages: 5

Views: 138

The Natural Organizational Model and the Informal Groups

The nature of an organization is based on different factors such as the environment it is set up in. also, the type of activity it undertakes. This paper will examine the natural organizational model, the informal...

Words: 3009

Pages: 10

Views: 239

Why Pinkberry should focus on making orange and yellow the two prevailing colours

The fact that Pinkberry has evolved from a storefront to a nationally recognized brand makes this franchise of frozen dessert yogurt shops an example to be followed. Yes, the personality of a brand created a platform...

Words: 582

Pages: 2

Views: 93

Ford Motors: Board Presentation For Electric and Hybrid cars Production

Executive Summary The motor vehicle industry in America and worldwide is highly competitive with major players no longer enjoying the dominance that they had had before. Innovation and identification of trends...

Words: 1088

Pages: 4

Views: 129

Home Remodel Project Plan

Project Overview Home remodeling is one of the notable key projects undertake through project management, as a project manager is expected to come up with a clear plan that would help in meeting the expected...

Words: 2152

Pages: 8

Views: 68

How Airbnb Achieved Success

Hospitality industry includes firms that provide lodging and dining services for customers. Many of the businesses in the travel and hospitality industry offer customers with prepared meals, accommodation, snacks,...

Words: 906

Pages: 3

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration