ITM437 SLP1

Information security is faced with all forms as well as shapes of threats and when one looks at the computers they see various emerging threats. Some of the threats are only ideas or are being developed and therefore companies should be proactive in their day to day operations so as to stay ahead of the power curve (Jouini et al. 2014). This is because any catastrophic cyber attack can leave a nation crippled as any person can be really bothered by such attacks. Modern technology and constant connection of the society to the internet has aided in bringing about more creativity in business than ever before (Yeh & Chang, 2007). On the other hand, cybercriminals are always carefully looking at new ways that could help them in tapping the world’s most sensitive networks. Therefore, it is evident that there are ten threats and attacks.

Firstly, new technologies that are constantly being released each day are highly susceptible to attacks because of weak security. Although such new gadgets have Internet access; however, they have no plan for security which usually present an extremely serious risk since every unsecured connection implies vulnerability (Yeh & Chang, 2007). The fast technological development is a testament to the innovators but security slacks seriously which exposes them to external attacks.  Secondly, it is clear that cybercriminals are currently leveraging the social media as a medium for distributing “water holing” which is a complex geographical attack (Jouini et al. 2014). This kind of attack is used by the attackers in identifying and infecting clusters of websites that they believe targeted organizations’ members will visit.

On the other hand, the adoption of technology has dramatically expanded the threat landscape because technology is currently an integral part of people’s daily life, especially in this modern society. Currently, what we do is so inherently dependent on the technology which has increased the vulnerability to the associated threats (Yeh & Chang, 2007). A good example or idea that is still under testing and development is the self-driving cars. It is an interesting prospect now that the cars are hooked up to the satellites that they can be easily hacked into through the medium thereby harming the passengers (Jouini et al. 2014). Due to the rising use of technology in modern day life, kidnappers can easily hold individuals for ransom. However, terrorists, in the most of the extreme cases, could kidnap and carry off any country’s president and even a foreign dignitary. In this cyber age, people can fear getting into some types of transportation because of the inherent risks. Also, planes can make people afraid because they can be hijacked through computers because of their hooking up to the satellites (Yeh & Chang, 2007).

Security specialists have identified risks in cell phone security since the early phases of their connectivity to the Internet. The negligible mobile foul among the extensive rundown of recent attacks has clients far less worried than they ought to be (Jouini et al. 2014). Taking into consideration, our current culture’s unbreakable dependence on mobile phones as well as how little they have been targeted by the cybercriminals, it creates a disastrous risk or threat. They can easily be attacked by the cybercriminals as they prefer paths which the least resistance (Yeh & Chang, 2007).

Alternatively, there is a major network attack by cybercriminals through third-party entry points. For instance, an unfortunate contractor whose credentials got stolen and used in stealing financial data sets for over 70 million clients is the global retailer’s HVAC (Jouini et al. 2014). In addition, big data tools often come with the capability of being customized so as to fit the needs of organizations. However, firms continue to neglect proper configuration of the security settings thus increasing their vulnerability to the external attacks. For instance, recently the New York Times became a victim of a data breach after enabling just one of the many critical functionalities required in fully protecting the information of the organization (Yeh & Chang, 2007).

Updating or redesigning security software is a fundamental technology management practice as well as a compulsory stride to ensuring that big data is well protected. The software is usually developed or created to guard against known dangers or threats which imply any new malevolent code which hits an obsolete version of the security software might or will go undetected (Yeh & Chang, 2007). This is because they outdated version of the security software is not effective or efficient enough to detect the improved malicious code. Finally, there is a lack of encryption as few industries are yet to embrace protection of sensitive business data at rest and in transit although it is effective to do so. This has been a great problem in the health care industry as they handle highly sensitive data and that is the reason HIPAA compliance requires that each computer be encrypted (Samy et al. 2010). It is clear that there are several threats and attacks and hence companies need to take protective measures to ensure that their sensitive data do not fall into the wrong hands.

Get a 10 % discount on an order above $ 100
Use the following coupon code :
SKYSAVE