We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Check Writers' Offers

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and Get Writers' Offers

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Cybersecurity and the Internet of Things

Paper type: Essay
Pages: 5 (1068 words)
Categories: Computer, Computer security, Internet, Technology, The Internet
Downloads: 34
Views: 105

INTRODUCTION

Over the past years, an increase in cyber-attacks has become a severe social problem. The internet has become a fast way of communication between family, friends, organizations amongst many others. With that, criminals have become more adaptable to increase their ability to cause harm. Cyber security has become extremely vulnerable to humans, businesses that facilitates any person with access to the computer or any technology with the intension to cause harm. The rise of new technologies like cryptocurrency and its fact that it is almost impossible to trace because of decentralization (Corcoran, 2018) means that the cyber criminals have quickly adapted and learnt how to exploit and make illegal profits.

MINOR AND MAJOR THREATS THAT INDIVIDUALS IN SOCIETY FACE FROM THREATS OF BREACHES OF CYBER SECURITY

Recent researches discovered that age differences play a role in cyber security behaviours and risks. Young people are more likely to affected by cyber-bullying (Simon et al., 2019) than being exposed to phishing attacks than older people of working age and are more likely to share passwords and private information on social media sites.

While older individuals are less likely to protect their electronic devices with PIN codes ( ), they however find themselves under the influence of false adverts offering rewards for compromising security e.g. being lured with free gifts hence installing malware to their devices. In previous years, more than three million children have undergone cyberbullying, a high percentage (95%) reported to have being victims on social networks like Facebook (Tsirtsis et al., 2016).

The perceived relevance of cyber security attacks has an impact on individuals’ actions to report security incidents. The different ways people understand, define cyber security must become a priority for concern for interactive systems, training tools and educational materials.

It is common for people to spend frequently if they have access to online payments and other transactional methods thus creating huge costs for themselves. According to (Tsirtsis et al., 2016) people often transfer money in online games and gambling. However, in these transactions, people can spend money through fraudulent transactions, as the services do not clarify to their clients about extra costs. As a result, people with very little experience about these online transactions tend to create unnecessary costs for themselves.

Young individuals exploring the internet face the risk of being exposed to threats from products and services meant for adults. A study in the US showed that at least 75% of teenagers who attempted to buy cigarettes online managed to do so, while previously only about 3% did so in the previous years. While (Tsirtsis et al., 2016) stated that young people do not fully realize that the content on the internet is produced, they end up being exposed to improper content through popup adverts and messages.

MINOR AND MAJOR THREATS THAT ORGANIZATIONS FACE FROM THREATS OF BREACHES OF CYBER SECURITY

Social engineering

As more computers digitalize their operations, a socially engineered attack as stated by (Aldawood, H; Skinner, G., 2019) is “a psychological exploitation which scammers use to skilfully manipulate human weaknesses and carry out emotional attacks on innocent people”. social engineering goes beyond technical vulnerabilities of a user’s system. Users are lured into giving their access credentials to perpetrators who in turn acts as users carrying out tasks without the user’s knowledge. As a result, users are exposed to threats that could disturb information systems, transfer unaccounted funds and stealing private information.

Hacking has become a leading problem in the health sector since 2015. The fallout of the WannaCry attack in 2017, affected at least 200 000 systems in more that 150 countries and around 50 hospitals in the UK were affected directly (Martin G. et al., 2017). A predominant type known as ransomware was used to launch this attack on the health sector which blocked users from accessing their data unless a ransom is paid. The ransom threat affects the health sector more than other sectors in the industry due to poor cyber security measures and experts in cyber security are few therefore their services tend to be expensive for health organizations to pay for.

Employees of an organization can be an extremely high-risk factor. They can introduce threats to organizations with just a few clicks as private information is put available to them. If employees see a chance to make profit or look to get revenge through malicious acts, the privacy of clients’ data and the company’s information is compromised, organizations take a major hit. According to (Ali L. et al., 2017) IBM research in about 350 companies in 11 countries encountered at least 3.79 million average total cost of data breaches, therefore an increased amount of 23% cost of data breach compared in 2013. An increased use of the internet for daily tasks and communication call for concern for more security measure put in place.

IOT insecurities

For industries incorporating IOT services today, the use of IOT makes them a target for hackers. For example, the health sector makes use of connected devices to track and store private data. These devices need a greater level of protection. If not given priority, it can attract more harm as experienced in 2016 when the Hollywood Presbyterian Medical Centre had shut down its network for 10 days preventing staff from accessing medical records unless the hospitals paid ransom (Martin G, et al., 2017). The IOT is popular, its technologies make work places more comfortable improving efficiency and convenience through automation.

References

Andreas Tsirtsis, N. T. M. S. K. P. M. S., 2017. Cyber Security Risks for Minors: A Taxonomy and A Software Architecture. pp. 94 – 99.

Chigozie-Okwum, C. C. M. D. O. U. S. G., 2017. Computer Forensics Investigation; Implications for Improved Cyber Security in Nigeria. International Journal of Science and Technology, Volume 6(1).

Emily I. M. Collins, A. J. S. L. J. A. L. K. M., n.d. What is ‘Cyber Security’?:Differential Language of Cyber Security Across A Lifespan.

Hussain Aldawood, G. S., 2019. Contemporary Cyber Security Social Engineering Solutions, Measures, Policies, Tools and Applications: A Critical Appraisal. International Journal of Security (IJS), 10(1).

Mario Spremi?, A. ?., 2018. Cyber Security Challenges in Digital Economy. Proceedings of the World Congress on Engineering, Volume 1.

Robert West, K. M. B. K. Q. H., 2017. A Social Cognitive Neuroscience Approach to Information Security. 12 June.

White, J., 2016. Cyber Threats and Cyber Security: National Security Issues, Policy and Strategies. Global Security Studies,, 7(4).

Cite this essay

Cybersecurity and the Internet of Things. (2019, Dec 09). Retrieved from https://studymoose.com/cybersecurity-and-the-internet-of-things-essay

How to Avoid Plagiarism
  • Use multiple resourses when assembling your essay
  • Use Plagiarism Checker to double check your essay
  • Get help from professional writers when not sure you can do it yourself
  • Do not copy and paste free to download essays
Get plagiarism free essay

Not Finding What You Need?

Search for essay samples now

image

Your Answer is very helpful for Us
Thank you a lot!