Premium Essay

Cyberthreats

In:

Submitted By michelletitzer
Words 729
Pages 3
Cyber threats

Randi Titzer

BCC/403

April 10, 2016
Bobby “Robin” Kemp

Cyber Threats

A cyber threat is a possibility that a malicious attempt has been made to damage or disrupt a computer network or system. Cyber threats happen all over the world to all people. It doesn’t matter your race, religion, national origin, ethnicity, gender or sexual orientation. Cyber threats can be in various forms, such as what we will be discussing later on in the readings. We will discuss hacking of financial institutions, security issues, downloads/applications, etc. Each of these have serious consequences and can cause harm to the businesses and members of these businesses and/or owners of these accounts. Identify cyber-related threats that emerged from existing global technology

There are several types of cyber threats that have emerged from existing global technology. Some of these threats that I will discuss have not only had past effects on society as a whole, but they will also have some severe future effects on society too. The first threat that we are going to discuss is the security issues occurring with mobile devices, computers, etc. One example of this is the issue with the FBI and Apple. The FBI couldn’t get into an Apple iPhone of a supposed terrorist because the phone was encrypted. Apple would not help the FBI gain access to the iPhone and this is going to cause a lot of future problems if cell phone companies do not want to work with the law enforcement agencies in the future. The next thing we will discuss is the hacking of financial banking institutions and PayPal accounts, etc. The threat of being hacked in a financial institution is very large. This is something that happens a lot and people don’t even know the entirety of

Similar Documents

Premium Essay

Case

...hapless or hazardous employees. One of the key internal threats to corporates is spyware, because it’s all too often introduced without malicious intent, by employees that naively click through a couple of pop-up browser windows, or install an unapproved yet ‘cool’ application on the network. The situation isn’t helped by the myths that surround spyware. Human error, not technology, is the most significant cause of IT security breaches, according to a security survey released by the Computing Technology Industry Association Inc. (CompTIA) today. The survey, "Committing to Security: A CompTIA Analysis of IT Security and the Workforce," suggests more training and certification of IT workers will help the U.S. protect itself against cyberthreats. In more than 63% of security breaches identified by the survey's respondents, human error was the major cause. Respondents blamed only 8% of security breaches on purely technical failures. 2. Could it have been prevented? This could have been prevented by: First, make a Web filter a required part of the network security arsenal. This should prohibit users from visiting known spyware and ‘drive-by download’ sites. Second, deploy an effective email filter that blocks...

Words: 489 - Pages: 2

Premium Essay

Internet

...10 STEPS FOR SAFE WEB SURFING 1. Education – Educate yourself about the types of scams on the Internet so that you are better equipped to defeat them. Read up on the latest phishing scams, for example, and learn how to recognize them. 2. Use a firewall – Firewalls monitor traffic between your computer or network and the Internet and are your first and best line of defense. Most operating systems come with a firewall, but it won't help you if you don't activate it. 3. Click with caution – When checking e-mail or instant messaging, be careful not to click on links in messages from people you don't know. Such links could connect to phony websites designed to solicit personal information, or they could download Trojan horses or other malware designed to steal personal information. Even if the message is from someone you do know, it could still contain a computer virus; check with the sender if you have any concerns about the validity of the message. 4. Surf safely – When browsing the Web for financial institutions or other sites, take steps to avoid fraudulent sites that ask for personal information. Most legitimate sites don't ask for such information, but instead require registration ahead of time. Use a search engine that corrects misspellings so that you navigate to legitimate sites and avoid landing on a fake webpage. Creating fake sites with a similarly spelled address is a fairly common scam known as "typosquatting." 5. Practice safe shopping – Shopping online...

Words: 621 - Pages: 3

Premium Essay

Computer Crime Journal

...Journal - Week 1, Due 09.28.2014 Beginner’s Guide to Internet Protocol (IP) Addresses Beginner’s Guide to Internet Protocol (IP) Addresses. (2011, Mar. 04). Retrieved on September 26. 2014 from ICANN site: https://www.icann.org/resources/files/ip-addresses-beginners-guide-2011-03-04-en The Beginner’s Guide to IP Addresses is a publication by the Internet Corporation for Assigned Names and Numbers (ICANN), the private sector, non-profit corporation which assumes responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark...

Words: 7665 - Pages: 31

Premium Essay

Mobile Technology

...Who would have thought ‘super information highway’ would go mobile. With the emergence of new technology and people desiring to have technology at their fingertips, mobile computing has changed the way we interact with the world around us. While mobile technology provides the convenience of high availability and connectivity, these conveniences have also increased mobile device vulnerability to malicious attacks and threats. Many companies are providing mobile devices to employees in order to conduct business away from the office. This has proven to be major headache for IT professionals. Normally, IT professionals control network activity through vulnerability assessments, scans, audits, and security patches; unfortunately, the same does not hold true for mobile devices. Unlike wired network connections, mobile devices favor wireless internet connectivity and are constantly broadcasting for connection to a wireless network. Many hotels, restaurants, and airports offer free WI-FI to the public, unlike home or office networks, most public networks are not secure. It is tempting to utilize free connectivity to check email, however, these networks do not offer the level of encryption needed to conduct company business and employees should be advised to avoid unencrypted public wireless internet connectivity. Disabling Bluetooth wireless capability is another way to assist in protecting mobile devices from malicious attacks. Switching the Bluetooth access to...

Words: 733 - Pages: 3

Premium Essay

Yolo

...RESEARCH: CYBERBULLYING Members: Tapay,Daniel Breyton Reyes,Clark Lloveras,Marielle Sangalang,Maica Nchama,Julian Miguel Chapter I: Introduction According to Belsey (2004) "cyberbullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others" (Belsey, 2004). In 2006, the National Crime Prevention Council worked with Harris Interactive Inc., to create a study on cyberbullying. The study found that 43% of the 824 middle school and high school-aged students surveyed in the United States had been cyberbullied in the past year (cited in Moessner, 2007). The Pew Internet and American Life Project on cyberbullying conducted a similar study in 2006 which found that one out of three teens have experienced online harassment (cited in Lenhart, 2007). Pew also found that the most prevalent form of cyberbullying was making private information public; which included e-mails, text messages, and pictures (cited in Lenhart, 2007). The findings ofthe Pew research also indicated that girls are more likely to be part of cyberbullying than boys. Older girls, between the ages of 15 and 17, are the most likely to be involved in some form of cyberbullying, with 41 % of those surveyed indicating that they have been involved in some type of cyberbuUying (cited in Lenhart, 2007). Cyberbullying is different from traditional bullying due to the anonymity that the ...

Words: 985 - Pages: 4

Premium Essay

Aircraft Solutions

...Aircraft Solutions: Security Assessment and Recommendations Phase I and Phase II Table of Contents Executive Summary 3 Company Overview 3 Security Vulnerabilities 4 A Software Data Loss/Data Leak 4 A Hardware Firewall 5 Recommended Solutions 7 A Software Example Solution 7 A Hardware Example Solution 8 Impact on Business Processes 9 Summary 10 Appendix 11 References 17 Executive Summary Aircraft Solutions is aircraft Design Company that allows internal and external users to access its system. As a result of this, the company has made itself vulnerability to certain threats. This paper identifies two vulnerabilities. One is the threat of data loss or data leak. The other is intrusion by way of the internet firewall. Based on the known vulnerabilities, it was recommended that the Check Point Software Blade application is used to prevent the data loss and the Check Point Power-1 appliance be used to address the firewall vulnerability. Company Overview Aircraft Solutions (AS) design and fabricate component products and services for companies in the electronics, commercial defense, and aerospace industry. The mission of AS is to provide the customer success through machined products and related services, and to meet cost, quality, and scheduled requirements. Aircraft Solution uses Business Process Management (BPM) to handle end to end processes that span multiple systems and organizations. BPM system is designed to connect...

Words: 2691 - Pages: 11

Premium Essay

Cyber Bullying

...Joshua Nuneville Professor Doherty Child Psychology 27 October 2011 Cyber Bullying StopCyberbullying.org, an expert group on internet safety defines cyber bullying as: "a situation when a child, tween or teen is repeatedly 'tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted' by another child or teenager using text messaging, email, instant messaging or any other type of digital technology.” It has to have a minor on both sides, or at least have been initiated by a child against another child. Once adults become involved, it is cyber harassment or cyber stalking. Adult cyber harassment or cyber stalking is never called cyber bullying. The way a child does this bullying is only limited by their imagination and their access to technology, and the cyber bully one moment could become the victim the next. It has been suggested by the BBC that cyber-bullying may be influenced by videos that are uploaded to video sharing websites online, which contain offensive content or examples of acts of bullying. Websites that currently do not filter such videos, such as YouTube, have been asked to take legal action against videos of people being attacked, harassed or ridiculed, in order to reduce cyber bullying as a result. The kids often change roles, going from victim to bully and back again. Cyber bullying is usually not a one-time thing, unless it includes a death threat or a threat that would do serious bodily harm. Children have even killed each...

Words: 1054 - Pages: 5

Premium Essay

What Is Penetration Testing?

...What is penetration testing? Penetration testing is a way of trying to exploit the weaknesses of an organizations security defenses. Penetration testing may come in many forms and test different types liabilities. A few years ago people debated as to whether or not penetration testing was even needed. Now most people realize it is absolutely necessary. Although most people, when thinking of security breaches, think of network security in relation to hackers, there are many other security areas that must be tested. Some of these areas are physical security, telecommunications security, and environmental security. Other areas that may be tested are operating systems and applications, and social engineering. All of these areas are vital to the security of an organization. A breach in any of these systems may cause great detriment to the organization financially and a degradation of customer trust. Application and username/password weaknesses may be tested by using automated tools. These tools may also be used to find harmful software (virus, malware) which may lead to unlawful access to a company’s system. The best penetration tools supply the following options: 1. Easily deployed, configured and used 2. Scans systems easily 3. Distinguishes weaknesses based on severity 4. Verification of weakness automated 5. Test weakness previously found to make sure they are no longer viable 6. Able to produce logs and reports on the weakness of the system Not all weaknesses...

Words: 1495 - Pages: 6

Premium Essay

Cyber Bullying

...Cyberbullying by Nicole M. Aune A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science Degree With a Major in School Psychology Approved: 2 Semester Credits The Graduate School University of Wisconsin-Stout December, 2009 ii The Graduate School University of Wisconsin~Stout Menomonie, WI Author: Title: Aune, Nicole M. Cyberbullying Graduate Degree/ Major: MS School Psychology Research Adviser: MonthlYear: Number of Pages: Dr. Amy Schlieve December 2009 29 Style Manual Used: American Psychological Association, 5th edition ABSTRACT A literature review of research pertaining to cyberbullying was completed. Findings indicate that cyberbullying is becoming more prevalent as students spend an increasing amount of time using technology that keeps them connected to people at all hours of the day. There are many different ways in which cyberbullies reach their victims, including instant messaging over the Internet, social networking web sites, text messaging and phone calls to cell phones. There are different forms of cyberbullying including, but not limited to, harassment, impersonation, and cyberstalking. It has been found that there are differences between not only the prevalence of cyberbullying between males and females but also the ways in which males and females cyberbully. Like bullying, cyberbullying is a serious problem which can cause the victim to feel inadequate and overly self-conscious, along with...

Words: 7448 - Pages: 30

Free Essay

Bully

...Cyberbullying by Nicole M. Aune A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science Degree With a Major in School Psychology Approved: 2 Semester Credits The Graduate School University of Wisconsin-Stout December, 2009 Author: Title: The Graduate School University of Wisconsin~Stout Menomonie, WI Aune, Nicole M. Cyberbullying Graduate Degree/ Major: MS School Psychology Research Adviser: Dr. Amy Schlieve MonthlY ear: December 2009 Number of Pages: 29 Style Manual Used: American Psychological Association, 5 th edition ABSTRACT A literature review of research pertaining to cyberbullying was completed. ii Findings indicate that cyberbullying is becoming more prevalent as students spend an increasing amount of time using technology that keeps them connected to people at all hours of the day. There are many different ways in which cyberbullies reach their victims, including instant messaging over the Internet, social networking web sites, text messaging and phone calls to cell phones. There are different forms of cyberbullying including, but not limited to, harassment, impersonation, and cyberstalking. It has been found that there are differences between not only the prevalence of cyberbullying between males and females but also the ways in which males and females cyberbully. Like bullying, cyberbullying is a serious problem which can cause the victim to feel ...

Words: 7462 - Pages: 30

Premium Essay

Trends in Cybercrime-"Sextortion" in Teens and Children

...Trends in Cybercrime-“Sextortion” in Teens and Children Curtis M. Styles CJA/570 April 23, 2012 Ray Gagne Trends in Cybercrime-"Sextortion" in Teens and Children Electronic methods of committing crimes in society today, is generally a new phenomenon. Modern crimes directed against the operation of computer technology itself, presents new crimes that are as new as contemporary technology. The Internet has opened a variety of new rooms for cybercriminals to commit cyber-based terrorist attempts, computer intrusions, and major cyberfrauds. Cyberextortion is an outsider threat designed to obtain money, products, or favorable considerations from an organization or individuals by using illegal means of persuasion related to computer intrusion (Cybercrime Investigation & Intelligence, 2012). This paper addresses the relatively new form of sexual exploitation called “sextortion” that has emerged on the cybersex crime scene recently, and its affect upon teenagers and children. In addition, the paper addresses the dangers of scams associated with “sextortion”, its criminal profile, law enforcement initiatives to combat “sextortion”, and the penalties for committing these types of crimes. “Sextortion” is a method of sexual exploitation in which individuals are extorted with nude images of themselves shared online over the Internet. Texting has become the modern day method of communication among teens and children, and in the case of “sextortion” these images are displayed...

Words: 2163 - Pages: 9

Free Essay

English 101 Term Paper

...Social Media, Do They Really Make Us More Social? In today's society, many people of all ages use social networking sites like Facebook, Twitter, MySpace, Instagram, and many more through their phones and computers. These social networking sites allow people to find, connect, and have relationships with just about anyone, from a classmate in your English 101 class to the pretty girl or boy you just met in last night's party. Browsing these sites can make you feel connected with others, but such easy, casual connection in an electronic environment has its downside. These social networking sites do not improve the social lives of people, but instead, these sites ruin the social lives of people by creating false sense of connection, bullying, having less privacy, and decreasing people's productivity from the real-world. Ironically, social media sites do not make the social lives of people better. They isolate people from society and causes people to have difficulty communicating with others in the real-world. It is because the bonds that people have online are fake which creates false sense of connection or relationship causing people to struggle communicating with others in the real-world. "It’s true that by eliminating barriers like geography, time of the day, and physical availability for a conversation, these social media make it easier and quicker for people to remain in contact and have relationships with other people"("All this social media might be making...

Words: 2193 - Pages: 9

Premium Essay

Week 7 Project

...The Current Problems with Network Security and How We Can Fix Them Abstract Network Security has come a long way from the times when their wasn’t a need to worry about networks being attacked, and now to the current evolution of people where it’s not if your network will be attacked, it is when. The Current Problems with Network Security and How We Can Fix Them Network Security is defined by Sans Institute as the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment (SANS, 2014). As you can see with that definition the meaning can interpreted many different ways, so with this paper I will describe what network security is and how we can fix the ongoing problems. Current State of Network Security Before you fix or document any problems with network security you must first evaluate the current state of the problems we face. Most networks are somewhat secure, meaning they have the resources to make them nearly “bullet-proof”, but due to current policies within organizations, the information technology team is unable to enforce maximum security due to employees needing to plug their IPod’s in, charge their cell phones, and access social media sites, etc. the list could go...

Words: 2317 - Pages: 10

Premium Essay

Emerging Cybersecurity Strategies

...Abstract: Advanced cyberattacks on the public and private sectors at the local, national, and international level have prompted an increase in funding and support for the study of emerging cybersecurity technologies. The considerations for this paper are to discuss the emerging technologies and strategies that can be integrated across the public and private sector to improve cybersecurity on a local, national, and international level. New technologies need to dynamically assess networks real-time such as with the use of Remote Agents and Real-time forensic analysis. These technologies also need to make the attack space less predictable and constantly evolving such as through the use of moving target defense. Emerging Cybersecurity Technologies The E-government Act of 2000 was signed by President Bush to move toward a more 24-7 government. The dream was to eliminate the need to have to stand in line at the DMV for half a day just to pay annual vehicle registration fees (Barker, 2011). Security was certainly a concern, but it was not at the forefront of the move as government agencies would go through massive changes in equipment, manning, and practices in order to move information and programs online. Now, over a decade later we still see moves and changes taking place, such as the department of Veterans Affairs recently moving all of their applications, forms and records online. The expensive cost of getting the government caught up was expected with such an overhaul...

Words: 2624 - Pages: 11

Premium Essay

Strategie

...Corporate Treasury Insights 2015 As the Dust Settles . . . The Boston Consulting Group (BCG) is a global management consulting firm and the world’s leading advisor on business strategy. We partner with clients from the private, public, and not-forprofit sectors in all regions to identify their highest-value opportunities, address their most critical challenges, and transform their enterprises. Our customized approach combines deep insight into the dynamics of companies and markets with close collaboration at all levels of the client organization. This ensures that our clients achieve sustainable competitive advantage, build more capable organizations, and secure lasting results. Founded in 1963, BCG is a private company with 82 offices in 46 countries. For more information, please visit bcg.com. BNP Paribas has a presence in 75 countries and has more than 185,000 employees, including 145,000 in Europe. It ranks highly in its two core activities: Retail Banking & Services (comprised of Domestic Markets and International Financial Services) and Corporate & Institutional Banking. In Europe, BNP Paribas has four domestic markets (Belgium, France, Italy, and Luxembourg) and BNP Paribas Personal Finance is the leader in consumer lending. BNP Paribas is rolling out its integrated retail banking model across the Mediterranean region, in Turkey, in Eastern Europe, and throughout a large network in the western part of the United States. In its Corporate ...

Words: 5737 - Pages: 23