The response must be 200 words and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been
The response must be 200 words and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been published within the last five years. Acceptable sources include texts, articles, presentations, the Bible, blogs, videos, etc.
Textbook:
Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.
Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.
COURTNEY
Cyber Event
Cyber-attacks occur daily and are constantly evolving. In the past quarter century alone, cyber attacks have evolved from tiny hacks created by high-school students to state-sponsored attacks compromising presidential elections (Rid & Buchanan, 2016). Cyber-attacks can be conducted by either an insider or outsider source. One example of an insider cyber-attack occurred between 1976 and 2006. For over 30 years Greg Chung of Boeing stole over two billion dollars’ worth of aerospace documents and gave them to China (Uma & Padmavathi, 2017). During the investigation, over 225,000 pages of sensitive material were recovered in Chung’s home. This cyber attack is considered one of the largest insider attacks in history with malicious intent to supply China with proprietary military and spacecraft intel (Uma & Padmavathi, 2017).
Top Cyber Threats
There are multiple cyber threats that we face today. The top three cyber threats we are facing today are social engineering, ransomware, and third-party software exposure. Social engineering attacks exploit social interactions to gain access to valuable data. With social engineering, cyber criminals’ trick and manipulate their targets into taking certain actions, such as bypassing security measures or disclosing certain sensitive information (Rid & Buchanan, 2016). Ransomware attacks infect networks and hold data and computer systems hostage until a ransom is paid. Ransomware is among the top 10 cyber-attacks and is a popular way for attackers to target businesses (Rid & Buchanan, 2016). Lastly, many retailers use third parties for services such as payment processing. Even if a company does not directly handle personal information, including social security numbers or credit card numbers, a third party can put them at risk. With malware, hackers can steal data through third-party vendors, as they did in the Target malware attack in 2013 (Rid & Buchanan, 2016). Furthermore, significant changes have occurred in the realm of cyber security from the inception of cyber.
Cyber Security
One of the significant changes that has occurred within the realm of cyber security is technology advantages. The rate of cybercrimes have grown exponentially and is consistent with the growth of technology. As technology expands and develops, so do the cybercrimes that are committed (Rid & Buchanan, 2016). Therefore, developing technology affects cyber security. One way developing technology has changed cyber security is through corporate security breaches. The majority of these corporate security breaches occur when hackers exploit employees through social engineering and scams. With advancements in technology, hackers are becoming more skilled at finding holes and cracks in corporate security systems and can gain access to protected files and data, posing a significant cybersecurity threat (Rid & Buchanan, 2016).
Most Significant Threat
While it is difficult to accurately predict the most significant threat, we will face in the future based on cyber threat, one aspect that needs to be discussed is the pandemic. With the pandemic, more individuals have been working from home. With individuals working from home, there is an increased risk of security breaches.
Biblical Worldview
Cyber-attacks can be viewed as stealing of property. From a biblical worldview stealing is a sin. One Bible verse states, “Anyone who has been stealing must steal no longer, but must work, doing something useful with their own hands, that they may have something to share with those in need” (King James Bible, 1796/2020, Ephesians 4:28).
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.