The use of Internet of Things has catalyzed the growth of a new generation of cyber security threats such as the use of malware used by cybercriminals to hack and steal data from vulnerable networks of unsuspecting users. This research paper focus on Internet of Cyber security issues in networks, computer hardware, and software systems.
Keywords: Cyber Security, The Digital Age, Cybersecurity threats, Trends in Cybersecurity
Internet dependence dominates the 21st-century technology platforms, and progressively new inventions are heavily reliant on the web connections to achieve maximum functionality. Internet of Things (IoT) is rapidly transforming the household landscape with users acquiring systems that can be remotely controlled using the IoT devices. However, these equipments are increasingly becoming exposed to the threats posed by cyber attacks such as hacking, data theft, and misuse. One of the dangerous cyber attacks was the WannaCry ransomware cyber-attack that led to the loss of over $ 1 billion from individual users and financial organizations ("Cybersecurity Statistics and Facts for 2017-2018 | Privacy.net"). According to a report by Cybersecurity Ventures, cybersecurity attacks targeting IoT gadgets and Individual computer software systems have increased by 600% and 200% respectively (Fruhlinger, 2018). In acknowledgment of this underlying fact, this research paper aims at undertaking an in-depth study in the emerging trends in cybersecurity issues in the 21st century with an ultimate goal of understanding the various threats that they pose in the life of IOT device users.
Delegate your assignment to our experts and they will do the rest.
- Research Questions
This research paper will aim at answering the following research questions:
1. What are the emerging Internet of Things Cyber Security Issues?
2. What type of risks do Internet of Things users face from using the devices?
- Methodology
This paper will adopt a literature-based research methodology with a special emphasis on the existing peer-reviewed sources that answer the paper research questions. Also, different statistical data reports and surveys conducted by various agencies will be examined to provide supporting evidence showing the extent of the problem. The data will be interpreted through a theoretical analysis approach to explain the various findings and theoretical assumptions made therein.
- Literature Review
Cybersecurity issues in the 21st century have tremendously evolved over the years. According to Jordan et al., (2018) the continuum of cybercrime attacks targeting social media accounts, online monetary systems, cloud services, and IoT devices have established new methodological styles. The working definition the threat is, “All types of activities conducted by an individual or entity with the aim of compromising confidential information that jeopardizes the target’s integrity of their available data(Schatz, et al., 2018).”. Reports published by various Cybercrime agencies including the US Federal government and Cisco, postulate that Ransomware is increasingly becoming one of the most lethal forms of cyber-attacks that organizations should remain very vigilant. It has emerged as one of the most effective ways to attack organization networks because it eliminates the need for human agents for installation and deployment (Schatz, et al. 98). The figure below illustrates findings by Fire Eye that shows a high rate of constant attacks targeting customers.
- Results and Discussions
The findings of this research indicate that emerging cybersecurity threats are rapidly becoming more advanced and pose a higher risk to the social, financial and physical aspects of society. The fact that hackers are increasingly choosing to adopt ransomware as a preferred mode of cyber-attack significantly raises the damage levels of the cyber-attacks. These new threat levels are insanely high, and there is a need to ensure that effective protocols are put in place to eliminate all forms of threats. The high-frequency rates of attacks and the discovery of IoT devices being used as points of entry into network systems, as Taeihagh & Lim, (2018) observes demands intervention that eliminates the risk of attacks. This paper proposes various interventions to be put in place to ensure that there towards the future the adverse effects remain relatively low. Active and real time monitoring IPS systems are effective strategic intervention to ensure that intruders are detected early and effectively eliminated from the networks. Other strategies may include regular employee training in various ways to ensure the security of devices within a network.
Conclusion
In conclusion, cybersecurity plays a fundamental role in advancing a safe and secure cyberspace environment. The emerging cybersecurity threats trends in the 21st century digital age are very advanced and thereby require conventional security solutions. IoT devices and malware have not only significantly increased the risk of cybercrime but also presented notable threats that are fundamental to the safety standards of using the internet and connected devices. It is, therefore, a requirement that cybersecurity laws and network protocols policy ensures that all web-based companies employ regular cyber-intelligence reporting. The intervention will ensure that all new threats that emerge are accurately identified and countermeasures put in place to prevent any substantial impact to the individual user or the company itself as the discussions in this paper shows.
References
Annon, D. (2019, July 4). Cybersecurity statistics and facts for 2017-2018 . Privacy.net. https://privacy.net/cybersecurity-statistics/
Fruhlinger, J. (2020, March 9). Top cybersecurity facts, figures and statistics for 2020 . CSO Online. https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html
Jordan, G., Leskovar, R., & Marič, M. (2018). Impact of fear of identity theft and perceived risk on online purchase intention. Organizacija , 51 (2), 146-155. https://doi.org/10.2478/orga-2018-0007
Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. The Journal of Digital Forensics, Security and Law . https://doi.org/10.15394/jdfsl.2017.1476
Taeihagh, A., & Lim, H. S. (2018). Governing autonomous vehicles: Emerging responses for safety, liability, privacy, cybersecurity, and industry risks. Transport Reviews , 39 (1), 103-128. https://doi.org/10.1080/01441647.2018.1494640