Professional Documents
Culture Documents
We are living in a world that is swiftly developing. At this world, most of us have been using smart
devices and we have been using the Internet with these devices. Generally, our data is kept on the
Internet and this place in which this information are stored is designated as cyberspace. In this place,
there are lots of attackers, and they are always trying to hack our data. So, we have to ensure security
here. The following essay takes a look at some concepts of words that are related to cyberspace,
cyberattack then I will mention common cyber threats. Also, I will talk about the significance of cyber
security and afterward, we are going to analyze if importance given to cyber security is sufficient or
insufficient.
These are three basic concepts about cyber. We have to know these because cyberspace, cyber
security and cyberattack are really important for the Internet and technologies. Consequently, these
concepts are virtual but concepts that affect us.
Malware: it means malicious software. Malware that is one of the most common cyber threats is
software that attackers try to disrupt or bring damage to a victim’s computer. Usually spread through
an unwished-for email attachment or legally-looking download, malware might be used by
cybercriminals to earn money or in politically motivated cyberattacks (‘What is Cyber Security?’, n.d.).
SQL injection: it is a means by that an attacker can take advantage of a vulnerability to take control of
a victim's database. Several programmers watch out the Structured Query Language (SQL)
commands while they are designing databases and lots of data that are harvest from users are sent to
these databases. In a SQL injection attack, for instance, a hacker will write some SQL commands into
a web form that is wish for name and address info; if the web site and database are not programmed
properly, the database may try to run those commands (Fruhlinger, 2020).
Phishing: it is when cybercriminals target victims with emails that seem to be from a legitimate
company asking for sensitive knowledge. Phishing attacks are often used to dupe people into handing
over credit card information and other personal info (‘What is Cyber Security?’, n.d.).
Denial-of-service attack: it is a brute force technique to try to prevent some online service working
properly. For example, attackers may send such a lot of traffic to an Internet site or several demands
to a database that it overwhelms those systems capability to function, making them unavailable to
anybody. A distributed denial of service (DDoS) attack uses a military of computers, usually
compromised by malware and under the control of cybercriminals, to direct the traffic towards the
targets (Fruhlinger, 2020).
These can be considered the basis of threats. Then these can branch out in itself, but we are not
going to talk about threats extensively. Therefore, knowing common cyber threats will be enough.
Besides we can see that not every attack bring damage to systems. Some of them seem to legal,
even not so, because they do not attack your system. They just try to gather information in a variety of
ways. As a result of they are causes more problems for us.
Cyber security has a really important place in our lives because most of our data are kept in there.
Therefore, we have been working to ensure security in there. If we want to argue importance given to
cyber security, we should look at the research related to cyber security.
According to the AT&T Cyber Security Report, there was a 458% increase in the times hackers
looked for weakness of IoT connections.
According to the Cisco Security Report, there was a 221% increase in the security violations of
the web sites.
According to the Dell Annual Security Report, the number of malwares nearly doubled to roughly
8 billion.
According to the Symantec Internet Security Threats Report, spear phishing campaigns aiming
employees increased 55% compared to 2015 (Morgan, 2016).
In a circumstance that the numbers are like this, we cannot say to attach importance to cyber
security is sufficient because numerous people are using Internet, but hack activities are
increasing day by day, too. Maybe we are not affected from hack activities, but these affect us
implicitly. Taking everything into consideration, we have to pay more attention to cyberworld.
Conclusions
As a result of the increasing popularity of technologies, companies, people and nations are performing
many activities in cyberspace at the present time. Increasing use of technology bring along some
issue as well as benefits. The most important sample of these issue are cyber threats and
cyberattacks. Also, these issue cause to be massive harm. Therefore, we have to ensure secure in
cyberspace.