Saturday, May 18, 2019

Security challenges faced

Cyber-crimes atomic number 18 described as crimes either created by the internet or aided by the internet. The danger posed by cyber crime to Australia and global federation is discussed.Security challenges faced in the future atomic number 18 predicted using the Law of accelerating returns where technological expansion rate is exponential. This renders long-run predictions of cyber-related developments difficult to make. With technological advancements, young people continue to integrate their personal life into widespread data processor networks.This is aided by social networking lays which are used by cyber criminals to collect personal information and the pretermit of vigilance displayed by these young generation. They continue to be reckless despite better awareness.Tracking the trends of cyber crime is not well coordinated but available information indicates an increase in cyber crime which is interestingly linked more to the human element than technological advances. Th is indicates that people continue to make poor choices with regards to risk.Cyber crime is point to increase in the next five years as organized criminal groups consolidate. Most of these groups are based mainly in Eastern Europe but will probably spread to Asia. With the repoint of making criminal profit there has been the creation of almost undetectable infiltration software.The use of advance(a) software to perpetrate crime like the botnet where compromised computers are organized into a network and used by criminals.Botnets present a high risk for online fraud in the future. Phishing, where an unsuspecting user is tricked to think they are communicating with their bank to obtain their password is likely to continue. Denial of Service (DoS) attacks which flood an internet site to take the site offline will continue and be used to hold at ransom companies and overturn activities of response teams.In a recent cyber attack in Australia during Cyber Storm 2 cyberwar-game event de monstrated study weaknesses that led to successful attacks in all areas of business. All indicators are that in the next years, not ofttimes improvement would have been made in response to cyber attacks.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.