Cyber Threats

In: Computers and Technology

Submitted By Peterplant
Words 931
Pages 4

11 August 2012

The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising importance of cyber security at the work place.

These security threats are becoming more common every day. Workplaces and personal lives are being attacked by using smaller more mobile devices. Therefore these cyber threats will be talked about in Therefore, these cyber threats will be assessed, to give you an idea of what they can do to your company or life, and the proper response on how to mitigate them.
With cyber security becoming an issue in todays corporate society the corporate world is looking into all of the threats to mitigate the leaking of sensitive information to the public. This has come to light with hactivists conducting large-scale exploits to infiltrate law enforcement agencies and major companies and steal sensitive data that could embarrass or damage certain organizations (Wansley, 2012). In this paper the top five cyber security threats for 2012 will be assessed and talked about to help control, mitigate, or defeat those threats. According to the article “Top 10 Cyber Security Threats in 2012 - And What to Do About Them” by Securities Technology Monitor, the top 10 cyber threats are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, everything physical can be digital,…...

Similar Documents

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. ......

Words: 3494 - Pages: 14

Cyber Threats

...Cyber Threats Roger Larew SEC 402 Informational Warfare February 16, 2011 Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U.S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents Unlike an annoying virus or computer attack that results in denial of service, a cyber terrorist attack could lead to physical violence or extreme financial harm. According to the U.S. Commission of Critical Infrastructure Protection, possible cyber terrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. Cyber terrorism is often referred to as electronic terrorism or information war. Based on recent reports and the information presented to congress, America has a long way to go before security threats are adequately addressed. Almost half of 2,131 U.S. companies polled had no formal security policies in place, and most relied primarily on user passwords and multiple logons for protection. Only 49% of U.S. companies had plans to raise user awareness of policies and procedures in the next 12 month. Unbelievably only half of 150 companies surveyed by InformationWeek Research one week after the terrorist...

Words: 641 - Pages: 3

Cyber Security

...Research Paper – Cyber Security From the growing use of smart phones to access the Internet to rogue employees in the workplace, the threat of cyber terrorism is increasingly on the minds of C-suite executives. At a recent conference sponsored by the Raritan Valley Community College Foundation, security experts addressed the threats, the exposures and the legal issues and best practices to bolster cyber defenses. Virginia Bauer, CEO of East Rutherford-based security company GTBM, explained that many people, like herself, first became familiar with security threats on 9-11(Bauer's husband was killed in the attacks and she has since been a 9-11 families advocate). "To combat the threat, better private and public partnerships are needed to develop solutions, something the 9-11 Commission recommended," she explained. GTBM's main product is Info-Corp(TM), a system that conducts real-time identification checks, scanning local, state, and federal National Crime Information Center (NCIC) databases, the Federal Terrorist Screening Watch List and all 50 states' motor vehicle databases. The identification checks are important to companies because the biggest cyber threat to businesses can be its employees. "Most cyber attacks happen internally," Bauer said. "The people who can be the most threatening to you are sitting in your offices, or are your consultants and vendors." Govi Rao, chairman of the New Jersey Technology Council and president and CEO of Noveda Technologies (a......

Words: 527 - Pages: 3

Cyber Bullying

...ENG 221 Cyber bullying In today’s world social media has become a big part of people’s social life, because it has become so popular bullies have discovered a new way to bully other people, in a much faster and easier way. During the last couple of years, “Forty-two percent of kids have been bullied while online and one in four has had it happen more than once” (End to Cyber Bullying).Whether it’s a Facebook account, or Twitter account, it seems like anyone can make an account and automatically start communicating with other people, and because of our technology today cyber bullying is easy for others to do. Cyber bullying happens world-wide twenty four hours a day seven days a week. Because of this, it is hard to keep specific statistics of how and when cyber bullying occurs. One million children and teens were harassed, threatened or subjected to other forms of cyber bullying on Facebook during the past year (Internet Safety). According to a survey conducted by i-Safe America, the statistics are as follows: thirty-five percent of kids have been threatened online, and one in five had it happen more than once. Twenty-one percent of kids have received mean or threatening e-mail or other messages. Fifty-eight percent of kids admitted that someone said mean or hurtful things to them online. Four out of ten say it happened more than once. Fifty-three percent of kids admitted to having said something mean or hurtful to another person online. One in three has done so more than...

Words: 3549 - Pages: 15

Cyber Crimes

...Cyber Crimes Cyber crimes are on some of the hardest crimes for the police to stop and catch the perpetrators because they can commit a crime in one state or country and physically be in another state or country. While the invention of the Internet has had great affects on the growth of technology, it has also given criminals an extremely large place to hide in and the laws are still trying to catch up with the growth of technology. The different technology crimes that occur fall into one of the three following categories: cyber piracy, cyber trespass, and cyber vandalism, and like the original crimes of piracy, trespass, and vandalism these crimes are similar except they happen in digital form. Three Categories of Cybercrime There are three categories of cybercrimes that can cause a lot of trouble for any individual or organization who becomes a victim of these crimes. Cyber piracy, trespass, and vandalism in some ways are similar because they all involve taking advantage of individual people or organizations by stealing personal information through digital techniques. 1. Cyber piracy Cyber piracy has two definitions; the first definition is when a person uses cyber technology unlawfully to produce copies of proprietary information. While the second definition is when a person uses cyber technology to distribute proprietary information, while it is in digital form, across networks. 2. Cyber trespass Cyber trespass has two definitions as well. The first......

Words: 819 - Pages: 4

Is Cyber Crime a Serious and Growing Threat?

...Is Cyber crime a serious and growing threat? 1. INTRODUCTION Cyber crime cannot be clearly defined but all the definitions that are attributed to it basically boil down to the following: “an unlawful act wherein the computer is either a tool or a target or both" (Dubey 2004). On the other hand, ‘threat’, in this context, can be construed as “something likely to cause damage or danger” (Online dictionary 2014). Generally speaking, any unlawful act is expected to cause harm and cyber crime is no exception to this general rule. It has been noted that since the public release of the World Wide Web in 1991, the Internet has known an explosive expansion and continuous upgrading. Unfortunately, cyber crime has also gained in preponderance and sophistication in direct correlation with this Internet revolution. Given its stealth characteristics coupled with its alleged multifaceted implications in terms of both financial loss and security issues, cyber crime has already got the legitimate recognition of a growing and serious threat by the various stakeholders concerned. The only contentious issue is perhaps the monetary quantification ascribed to the resulting damages which is often greeted with much skepticism. 2. CATEGORIES OF CYBER CRIME Indeed, cyber crime does not lend itself to a narrow definition and is generally classified into four categories; that is, crimes committed against the individual, property, organisation and society (Mali 2009). This classification also......

Words: 2796 - Pages: 12

Cyber enough to secure the trust between human users and machines, protect against rogue insider threats and nation-state conflicts worldwide? Will there be enough protection to ensure there is no lost in privacy? Since the 1970’s much work has been done by private industry and government, which has led to some key industrial and medical transformations. Or what is being call smart technology today. Smart technologies have revolutionized the United States (U.S.) military operations; medical field advancements and the information technologies used operate the critical infrastructure that feeds the heart of the U.S. economic and people. However, these advancements have also enable a wide range of malicious activities, such as crime, espionage and terrorism. The U.S. and it’s partners are grappling with a number of complex cybersecurity issues ranging from the proper role of government in protecting U.S. intellectual property to the establishment of the global norms for Internet governance. This paper will discuss two emerging technologies, smart and bionics, and will examine the security challenges and cyber threats associated with them. It will outline how these emerging technologies are used by private and government organizations. Dived further into some of the prominent cybersecurity policies and legal implications that might be associated the use of them. Emerging Cyber Technologies There is some much hype about smart technologies such as smart phones; cars......

Words: 2506 - Pages: 11


...Threats of new entrants The threats of new entrants could recognized low due to several fact: The size of economies of scale and its main competitors,are very large. They have strong market power and capital to maintain their value. For the company, it has more than million servers located around the world to provide searching services to customers and obtain information from customers. Therefore, they understand the customer’s habits. Its main competitors are also not lag behind to improving their searching engines servers. It have high brand loyalty of users and it is famous that one of the strongest brand recognitions in the world. However, the switching cost is low. For users, other search engines were literally one click away. The barrier of entry is high so that if a new entrant would like to earner internet industry and would get successfully, it needs to have Sufficient of capital and technology that provide a better searching engine, and also must overcome the brand loyalty. Threats of exiting rivalry The threats of exiting rivalry have two parts, searching engines and advertising. For searching engines, the threats of exiting rivalry are low. The company have obviously competitive advantage. Its searching engines provide the best searching result and the fastest searching speed in the industry. But the good performance of searching engines is in order to acquire more advertisement that place at its website. It is not a only way for advertiser to place......

Words: 495 - Pages: 2

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist......

Words: 1810 - Pages: 8

Cyber Security

...In this age where the use of computers and networks related to them has become commonplace, there has developed problems concerning cyber security. Cyber security is an important factor to be considered if one is to be able to protect oneself from malicious people and software from the internet. Most of the threats to computer networks come from the internet and these are often intentional, having been developed by people with malicious intent. Cyber security is, therefore, an attempt by individuals to protect their personal information and other digital assets from attacks from the internet. Cyber security involves various steps the most important of these being an individual’s understanding of the different forms of attacks that they are likely to encounter. Once one has knowledge of this, then it is his or her responsibility to ensure that they have put in place the best security system they can get their hands on. There exist different types of threats and these can be considered to be of varying levels and risks to an individual’s personal information in their computers. The higher the possibility of an attack, the more advanced the security system that is to be put in place to ensure that the threat is minimized. Cyber security involves dealing with threats that range from malicious codes, which are known as malware and spyware, to computer viruses. Some of these viruses are so serious that they have the ability to erase entire operating systems of computers.......

Words: 374 - Pages: 2

Cyber Security

...CYBER SECURITY INTRODUCTION It is also known as “Computer Security or IT security”. It is applied to the security of computer, computer network and the data stored and transmitted over them. Today the computer system are used in wide variety of “smart devices, including Smartphone’s,  televisions and tiny devices as part of the Internet of Things, and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other networks. Computer security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction and the process of applying security measures to ensure confidentiality, integrity, and availability of data both in transit and at rest. There are the various elements of the cyber security which are as: 1. Application Security 2. Information Security 3. Network Security 4. Mobile Security 5. Internet Security 6. Cyberwarfare One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected. "The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no......

Words: 3559 - Pages: 15


... CYBER WARFARE Student’s Name Institution of Affiliation CYBER WARFARE Cyber warfare is also commonly referred to as the cyber attack. It involves both the attacks and the counter cyber warfare. By definition, it is an intentional breaching of a person’s or community computer system with an intended to fraud money or steal knowledge from the system. Therefore, it involves manipulation of the computer systems, disabling or to wipe out the aggregate information contained in the system of equipment. It has thus been a stern challenge in the economic and national and the world security. As thus, it has become a primary concern for all business people protecting their ideas not to be leaked, in the military due to the protection of national security and also by the government which has to keep it a secret of all what is happening within it. The issue of the cyber attacks has not been one event but something that has occurred over time as a result of inventions and innovations by the governments and security agencies. It was triggered by the need to safeguard one's interests and at the same time keep secrets that if they leak the competitors or the enemies can use them against you. One of the periods that can be credited to giving birth to the period of developments that led to cyber attacks is 1918 all the way to 1939 whereby there was increased military revolution. One of these......

Words: 1263 - Pages: 6


...original file. Encrypted files can only be recovered by obtaining the RSA private key held exclusively by the threat actors. (Jarvis, 2013) What we see is that while you can use antivirus (anti-malware) software, this only mitigates part of the problem, which would be any additional viruses or Trojans downloaded to your system. If the system gets infected and you find your files become encrypted, the only safeguard is to have a clean backup from which you can pull clean data. (Ducklin, 2013) If you did the research, you might be able to “black hole” at least some of the domains through policies to modify the localhosts file in computer systems and add the black hole list to your proxy server (if you use one). As an added layer of defense, network administrators could try to resolve known domains to IP address blocking them at the perimeter to prevent actual communication with the command and control server(s) involved in passing the encryption keys. Also, if possible, “enable Inbound and Outbound inspection of HTTP, FTP, IMAP, SMTP, POP3, CIFS/NetBIOS and TCP Stream.”(Best Practices, 2014) User awareness training is the keystone to all of this: if you are not educating them, they will show you they are the weakest link in the chain. A multilateral defense strategy is necessary to defend against this and other threats as they evolve over time; if you aren’t vigilant in the cyber realm, you are as good as hacked. References Alert (TA13-309A). (2013, November 5).......

Words: 833 - Pages: 4

How Should Singapore and Other Smart Cities Deal with the Increasing Risk of Cyber Threats?

...How should Singapore and other smart cities deal with the increasing risk of cyber threats? Fifty years after its establishment, Singapore is a smart city-state success story at the forefront of a third industrial revolution. Today, the Internet of Things (IoT) increasingly interconnects Singapore’s cyber and physical systems, sensors and smart technology into the digital fabric that links society and critical infrastructures such as transportation, health, finance and defense. Infrastructure investment is expected to grow by 50% to about $30 billion by the end of the decade. But as Singapore and other smart cities become increasingly connected to cyberspace, so too does their risk of cyber threats. For the next 50 years to be as prosperous as the last, Singapore and other smart cities and nations need to develop a cyber-smart workforce, technology, policies and new risk management solutions. Cyber Smart City: Opportunity and Challenge The Cyber Smart City Opportunity of new IoT-inspired products, services and markets could boost the gross domestic product (GDP) of the world’s 20 largest economies by $14.2 trillion in 2030, according to a recent study by Accenture. This trend can be seen in Singapore’s smart buildings, where converged information and operational technologies infrastructures, control systems and sensors integrate multiple electronic systems to support building management and business functions. Smart building technology is increasing energy......

Words: 417 - Pages: 2


...20 THREATS 1 Since this is a pioneering, people might find it unusual to use a toothpaste in a chewable form. 2 Another challenge would be convincing the traditional toothbrush users to buy the product. 3 The biggest competitor would be the chewing gum companies. 4 There is a high potential that consumers will not use this product as a substitute product for toothpaste. 5 Possibility of slow market growth. 6 Possibility of product being a “fad” in the market. 7 The challenge of being universally accepted in the marketplace. 8 Once it enters the market, it can be easily duplicated. 9 There could be a low customer demand. 10 It would be difficult to penetrate the competitive market. 11 Doctors may still recommend toothpaste as the number one solution for oral treatment. 12 The need to have the positioning of product in the minds of the consumers would be hard to achieve. 13 Mouthwash companies can also be seen as one of the competitors. 14 Customers might not find the same satisfaction they get from tooth brushing. 15 The changing needs of the consumers are inevitable. 16 As a developing company, it requires a huge amount of effort to market the product. 17 The increasing number of counterfeits. 18 There could be a seldom buying in this product since people are used to brushing teeth. 19 Consumers especially generation X may perceived that it may cause cavity because of being a gum type. 20 It may be difficult for the company to achieve its desired...

Words: 267 - Pages: 2