201-15-3264 (5)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

ASSIGNMENT

NAME: SHAKIB AL HASAN

ID:201-15-3264
A REVIEW ON CYBER SECURITY

INTRODUCTION
Cyber security refers to the body of technologies, practices, and processes designed to preserve networks,
programs, devices, and data from damage, attack, or unofficial access. Cyber security is also known as
information technology security.

The Importance Of Cyber Security

Cyber security is important because military, government, corporate, medical, and financial organizations
collect, process, and store unparalleled amounts of data on computers and further devices. A full-size part of
that information may be sensitive data, whether or not that be intellectual property, economic facts, private data,
or different kinds of facts for which unauthorized access or publicity should have poor consequences.
Organizations transmit sensitive facts throughout networks and to different devices with inside the course of
doing businesses, and cyber safety describe the field dedicated to protecting that data and the structures used to
process or save it. As the quantity and sophistication of cyber-attacks grow, companies and organizations,
mainly the ones which might be tasked with safeguarding data regarding national safety, health, or economic
records, needs to take steps to defend their sensitive business and personnel data. As early as March 2013, the
nation’s top intelligence officers cautioned that cyber-attacks and virtual spying are the top risk to national
safety, eclipsing even terrorism.

Challenges Of Cyber Security

For an powerful cyber safety, an corporation needs to coordinate its efforts throughout its whole records system.
Elements of cyber embody all the following:

Network security: The method of protective the network from undesirable users, attacks and intrusions.
Application security: Apps require consistent updates and checking out to ensure those applications are secure
from attacks.
Endpoint security: Remote access is a essential a part of business, however also can be a weak factor for data.
Endpoint security is the technique of protective remote access to a organization’s network.
Data security: Inside of networks and programs is data. Protecting organization and client information is a
separate layer of safety.
Identity management: Essentially, that is a method of understanding the get entry to each person has in a
company.
Database and infrastructure security: Everything in a network includes databases and bodily
equipment. Protecting those devices is similarly important.
Cloud security: Many files are in virtual environments or “the cloud”. Protecting records in a 100% on line
environment offers a huge amount of challenges.
Mobile security: Cell telephones and tablets contain virtually each kind of safety challenge in and of
themselves.
Top five Popular Cybercrimes: How You Can Easily Prevent Them
Over the course of the beyond few years, hackers and cyber-crooks armed with sophisticated malware have
stolen actually loads of hundreds of thousands of dollars from on line banking accounts and people all around
the world. We have stated it many times before in recent articles, the days of robbing banks in individual are
gone and now it all takes region behind a display screen of a computer linked to the Internet.
To protect yourself towards cybercrimes you should first understand what kind of cybercrimes there are. The
net is a complicated infrastructure in which cybercriminals create approximately 57,000 scam web sites each
week. In 2008, there had been approximately 10 million victims of identification theft in America alone
according to an Agency-France Press record. The effortlessly preventable cybercrimes attack pc users through
numerous unique techniques along with using cyber stalking, harassment, invasion of privacy, phishing and
even via being on-line impostors. If you're thinking what every of those cybercrimes involve, view our listing of
the five popular cybercrimes to effortlessly protect your -self from. All are defined below:
i) Phishing scams: Phishing is an exercise of a cybercriminal or hacker attempting to attain sensitive or private
information from a laptop person. This method is typically performed through phishing web sites which can be
designed to imitate a legitimate internet site in hopes that the unsuspecting laptop consumer will enter numerous
bits of private information such as their banking passwords, domestic address or maybe social safety number.
To avoid phishing scams, we suggest the usage of a phishing filter function to your internet browser in order
that it may actively experiment web sites which you visit to test if they were diagnosed as a phishing internet
site.
ii) Identity Theft scams: Cyber crooks who can also additionally have gained access to your credit card or
banking account data may also use that information to make purchases on your name. Identity theft has been a
main problem even before the theory of the Internet however as you may already recognize, the digital world
has made it lots easier for criminals to make use of and steal your identification. One of the perfect and least
costly activities to protect your identification is to closely monitor your accounts. If you observe suspicious
activity, you should report it to the right government without delay. Be proactive and do not waste time in those
situations. Identity theft scams are very normal on line and can come with inside the form of a junk mail email,
internet site or maybe an internet pop-up survey. Phishing is a primary contributor to identification theft
additionally.
iii) Online Harassment: Harassment on line is normally associated with your social life-style and in case you
pick to use a popular social network such as Facebook or Twitter. Online harassment can include threats sent
via email, instant message or via a social community message/post. Usually, it is simple to report those threats
to the social network you are being harassed on. Harassment also can be discovered to result in cyber bullying
children that can have dire consequences as you can have witnessed recently with inside the media wherein a
13-year-old youngster from Dardenne Prairie, Missouri, named Megan Meier devoted suicide from being
bullied on line. Our suggestion for dealing with harassment on line is to at once report any activity out of the
regular before it receives out of hand even if you may recognize the individual on the opposite end. Often on
line impostors who harass you on line does it to discover your 'breaking point' however you should never let it
get that far.
iv) Cyber stalking: Cyber stalkers will visit excellent lengths to try to display a victims on line activity. This
can also additionally encompass infecting a individual's laptop with malware this is capable of log laptop
activity. Cyber stalkers also are recognized to continually harass their ability victims. Cyber stalking cases must
additionally be reported to government, just like on line harassment instances. Cyber stalkers may also contact a
victim's colleagues, friends and other on line contacts in order to slander them or extract private information
from them.
v) Invasion of privacy: The invasion of privacy is essentially the act of a person attempting to interfere on a
individual's private life. This consists of hacking right into a person's laptop, reading their emails or tracking on
line activities. Many of those specific crimes are punishable under the law. If you ever suspect a person
invading your privacy, you may really contact the police and file a report. Local government can deal with those
conditions most times without seeking a selected on line regulation enforcement organization.
In any of the above instances, you should always have the proper laptop safety applications installed and up to
date to your laptop which may also include a trustworthy anti-spyware or anti-virus program.

TOP 10 CYBER SECURITY TRENDS FOR 2024


With the virtual revolution around all businesses, small or huge corporates, companies, or even governments are
counting on automated systems to manage their everyday activities and therefore making cyber safety a primary aim
to protect information from numerous on-line attacks or any unauthorized access. Continuous change in technology
additionally implies a parallel shift in cyber safety developments as information of data breach, ransom ware, and
hacks become the norm. Here are the top cyber safety developments for 2024 that we are able to cover in detail,
including:
Rise of Automotive Hacking: The first cyber safety trend in 2024 goes to be the rise of automotive hacking.
Modern motors these days come full of automatic software program developing seamless connectivity for drivers in
cruise manage, engine timing, door lock, airbags, and superior systems for driver assistance. These automobiles
use Bluetooth and Wi-Fi technology to communicate, which additionally opens them to numerous vulnerabilities or
threats from hackers. Gaining manage of the vehicle or the usage of microphones for eavesdropping is expected to
rise in 2024 with more use of automated cars. Self-driving or independent automobiles use a good in addition
complicated mechanism that calls for strict cyber security measures.
Integrating AI with Cyber Security: With AI being introduced in all marketplace segments, this generation
with a mixture of machine learning has introduced amazing changes in cyber security. AI has been paramount in
constructing automatic safety systems, natural language processing, face detection, and automated risk detection.
Although it's also being used to expand smart malware and attacks to skip the modern safety protocols in
controlling information. AI-enabled threat detection systems can predict new attacks and notify admins for any
information breach instantly, making it the next cyber security trend in 2024.
Mobile is the New Target: Cyber security trends offer a considerable increase (50 percentages) for mobile banking
malware or attacks in 2022, making our hand held devices a ability prospect for hackers. All our photos, economic
transactions, emails, and messages possess more threats to people. Smartphone's virus or malware may capture the
attention of cyber security trends in 2024.
Cloud is Also Potentially Vulnerable: With more and more corporations now installed on clouds, security features
want to be continuously monitored and up to date to protect the information from leaks. Although cloud
applications such as Google or Microsoft are nicely equipped with safety from their end still, it is the person end
that acts as a significant source for inaccurate errors, malicious software program, and phishing attacks.
Data Breaches: Prime target: Data will remain a main concern for corporations across the world. Whether it is for
an person or organization, safeguarding digital information is the number one aim now. Any minor flaw or bug on
your device browser or software program is a ability vulnerability for hackers to access private information. New
strict measures General Data Protection Regulation (GDPR) was enforced from May 25th, 2018 onwards, providing
information safety and privacy for individuals with inside the European Union(EU). Similarly, the California
Consumer Privacy Act (CCPA) turned into applied after January 1st, 2020, for protecting client rights with inside
the California area.
IoT with 5G Network: The New Era of Technology and Risks , Next raging cyber protection trend for 2024 is the
IoT with 5G networks. With 5G networks predicted to roll out in 2020 globally, a brand new generation of inter-
connectivity becomes a reality with the Internet of Things (IoT). This communication among more than one devices
additionally opens them to vulnerabilities from outdoor influence, attacks, or an unknown software program
computer virus. Even the world's maximum used browser supported through Google Chrome became observed to
have serious flaws. 5G architecture remains successfully new with inside the enterprise and calls for loads of
research to discover loopholes to make the device secure from outside attack. Every step of the 5G network would
possibly carry a plethora of community attacks that we may not be aware of. Here manufacturers want to be very
strict in constructing sophisticated 5G hardware and software program to manipulate information breaches.
Automation and Integration : Here's the following cyber safety trend - with the scale of information multiplying
each day, it is eminent that automation is included to give extra sophisticated manage over the information. Modern
hectic work demand additionally pressurizes specialists and engineers to supply quick and proficient solutions,
making automation more precious than ever. Security measurements are integrated during the agile technique to
construct greater secure software program in each aspect. Large and complicated internet applications are further
difficult to protect, making automation, as well as cyber safety, to be a important idea of the software program
improvement method.
Targeted Ransom ware: Another significant trend in cyber safety is that we cannot appear to disregard for 2020 is
focused ransom ware. Especially with inside the developed nation's industries depend heavily on specific software
program to run their everyday activities. These ransom ware goals are extra focused, such as the Want to cry attack
on the National Health Service hospitals in England Scotland corrupted greater than 70,000 clinical devices.
Though generally, ransom ware asks to threaten to publish victim's information unless a ransom is paid still, it may
have an effect on the big organization or in case of countries too.
State-Sponsored Cyber Warfare: There won't be any stoppage among the western and eastern powers in tries to
locate superiority. The tension among the United States and Iran or Chinese hackers regularly creates worldwide
information though the attacks are few; they've a full-size impact on an occasion such as elections. And with greater
than 70 elections sure to be held this year, criminal activities during this time will surge.

WHY THE NUMBER OF CYBER SECURITY JOBS IS GROWING IN 2024

Businesses and companies throughout the globe are falling victim to cybercrimes, while we write this. Cyber
safety issues like cyber threats and attacks have turn out to be a curse the world over.
Former US President, Barack Obama had as soon as stated: “Cyber threats pose one of the gravest national
security dangers that America faces… It’s clear that rather more work needs to be achieved to enhance our
cyber security.” Clearly, this spells the need for cyber safety specialists.
Not just this, generation large Accenture shared that during 2022, there has been a 27.4% internet growth with
inside the common annual number of safety breaches and that from 2020 to 2021, cyber security costs went up
by 22.7%. This in addition spells the gravity of the difficulty regarding the world.
As the events of information breaches are increasing unexpectedly, cyber safety problems are becoming a
nightmare for enterprises. The number of excessive profile data breaches with inside the last few years’ simplest
shows that dealing with cyber security issues is a mammoth-like challenge, even for huge players.
The unexpectedly escalating pile of sensitive consumer data – thanks to the proliferation of smart devices, the
Internet of Things (IoT), social media, and different virtual channels – has made it even greater important for
nations to reinforce their cyber safety front.

CONCLUSION
In this paper I tried to explain why cyber securities are very important concern for everyone and how we can
manage cyber security and what are the challenges of cyber security. Apart from that I tried to explain why
cyber security jobs are growing day by day , what are the popular cyber- crimes and how we easily prevent
them as well as what are the trends of cyber security.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy