Professional Documents
Culture Documents
In the dawn of the digital revolution, hackers were born. They roam the
technology sphere like gunslingers in the wild wild west. They hack systems,
hold data for ransom, inject malware, and crash networks. Attacks usually occur
when there’s something to gain and something to exploit, and the Internet has
been providing hackers with vulnerable treasures since 1990.
For the past decade, technology experts ranked data breaches among the most
dangerous information security risks. While data breach attacks remain a threat,
the Fourth Industrial Revolution (4IR), which fuses technologies into cyber-
physical systems, introduces risks that to date, have only existed in the
imagination of science fiction authors.
The Horizon Threat report warns that over-reliance on fragile connectivity may
lead to disruption. Vulnerabilities in Internet networks, smart devices, and poor
security regulations expose companies to attacks. Analysis by Gartner estimates
that more than 26 billion IoT devices, which rely on connectivity, will be
deployed by 2020.
The IST report warns that IoT devices can be used as gateways to inject
ransomware on connected devices and systems. Ransomware attacks encrypt
the victim’s data and demand payment for the encryption key. As more
industries adopt IoT technologies, the consequences of ransomware attacks on
IoT devices could incur expensive repair expenses, loss of authority due to data
loss, and mortal fatalities due to compromised medical systems and vehicle
components.
While the information age has provided people with opportunities and tools for
growth through online education and interactive learning, it has also given birth
to “fake news”. Information impacts every aspect of a company, from decision
making, recruitment procedures, business and product development, marketing
and promotion, and share price.
As nations engage in cyber warfare, the ISF report warns that premeditated
internet outages may bring trade to its knees. Cyber attacks on government
organizations, private companies, and financial institutions could lead to
millions of dollars in losses. Systems failures can force a transaction shutdown
that halts global trade, while the loss of connectivity shuts down government
services like law enforcement. Ultimate disruption can result in utter chaos.
Governments have begun creating surveillance legislation that grant gain access
to data owned or managed by communications providers. While the intention is
to monitor terrorist activities, the data collection may include other forms of
information, including corporate secrets. As more governments follow this
trend, cybercriminals may soon try to gain access to the data.
While companies can’t prevent governments from collecting their data, there
might be ways to prevent unauthorized use. The ISF recommends working with
communication providers to establish standard metadata storage regulations,
conducting regular risk assessments, and keeping track of stored metadata on a
regular basis.
Cryptocurrency hijacking attacks infect computers with malware that grants the
attacker use of the victim’s hardware resources. For example, infecting a
computer with malware that uses the processors for cryptocurrency mining.
Cryptocurrency hijacking attacks impact the overall performance of the
computer by slowing it down as the attacker gains a passive income.
Cryptocurrency hijacking attacks rise in popularity along with cryptocurrencies.
LO2
IT security solutions
In the present world of information with various complex hazards and malware,
it is highly important to protect the company's IT systems with more efficient
security measures. Such security measures help you to protect the computer
systems against hackers, fight against malware and control the employees' and
customers' access to the internal information.