Subcategory:
Category:
Words:
440Pages:
2Views:
352Any infringement of the regulation will attract a fine of 20 million euros 5 Evolution of cybercriminals Cybercriminals are driven by the thrill of playing with laid down rules and regulation in order to access restricted information A terrorist organization is paying these individual hackers to help them breach security policies of some organizations or government departments leading to increased cyber terrorists threats 6 Cyberwar and Espionage Governments are also using cyber skills for political disruption of other governments activities especially information systems for military purposes Any attack on a news site and spread fake news can create conflict on affected nations or parties Cyber crime not only affecting the non profit organization governments and private sector it has become a national cyber warfare 7 Threat of the cloud data Many organizations are using cloud computing services as a major solution to their next step of development Due to increased security threats new rules are being created to control virtual access to information on the cloud These rules are likely to affect the organization which relies on cloud based storage and computing 8 Ransomware attacks For the last few years ransomware threat has been growing attacking high profile victims and have infected more than 200 000 computers in more than 150 countries
Businesses and individuals need to update systems regularly and strengthen real time security defenses to avoid these kinds of threats 9 Bitcoin Crypto currencies The growing use of Bitcoins as a mode of payments is promoting money laundering since the distributed ledger maintains the anonymity of individuals doing transactions 10 Phishing campaigns Email marketing campaigns are being used to deliver malware Hackers are embedding a malicious code on forwarded emails to collect billing addresses and other sensitive information about companies and individuals Hardware security threats Hardware security involves the devices used to monitor network traffic Some these devices include hardware firewall and use of proxy servers It is important to consider the hardware vulnerability information from the manufacturer to assess its security Attack to routers backbones or firewall causes internet traffic slowing network performance Theft of hardware devices is also another security concern for the organization and some controls should be put in place for physical control of computing resources and equipment Conclusion Cyber attack methods are here to stay companies should employ network security analyst to monitor Internet and network securities issues Measures should be taken to protect against malicious ransomware and other security breaches In order to improve protection employees should be trained on security threats and how they can help the organization in mitigating any security risk Links to images https onlinedegrees sandiego edu 4 cyber security threats 2017 http searchnetworking techtarget com photostory 4500267793 Five essential network security topics and trends to watch 1 Network security issues Five vital trends and stats