Combating cyberattacks
In this essay, I will show
my research about how we can fight with cyberattacks and keep our technologies
secure and viable. My view is focused on a small part of cyberattacks, more
precisely on the attacks against the computer, most of those will be found on my major project, whose name is Security tools to combating cyberattacks. I will describe some types of
cyberattacks in the first paragraph and the defenses against cyberattacks in the
second paragraph. What grabs my attention is regarding the diversity of
cyberattacks and how its strongest is increasing year by year becoming harmful.
In the last decade technologies
era confront thousands of cyberattacks. According to the Hiscox Readiness
Report in 2019, companies have reported cyber incidents have risen from 45% in
2018 to 61% in 2019(Wharton 2019). The Cyber Security Breaches Survey has shown
around 32% of business and 22% of charities in The UK confronted with attacks
or breaches, the most common attacks are phishing attacks, viruses, spyware,
malware including ransomware attacks (Vaidya, 2019).
"Malware is short
for malicious software and is typically used as a catch-all term to refer to
any software designed to cause damage to a single computer, server, or computer
network, whether it is a virus, spyware, et al.'' (Moir R, 2009). Therefore, infection of malicious software can cause catastrophic damage. For example, a Trojan or a virus may delete important data, overload the network by DDoS(Distributed Denial of Service) attack, hardware
failure and otherwise failure in the system functionality. A large
number of Trojan or viruses do not show their presence in the computer and the system
can be operable, and they can produce damage without being detected(Kaspersky, 2020).
On the other hands these
attacks led to the creation of software to protect against malicious software.
According to Kaspersky (2020), we can use three methods, judicial, educational
or technical. The judicial method consists of issuing laws that prohibit the
distribution of programs that process cybersecurity. Over the years many
people throughout the world were arrested for cybercrime, many cases remained
unnoticed due to insignificant damage. The second method refers to protect via
education if users are informing about how easy they could deviate from cyber
law. Most often these two methods offer reduced safety it is recommended the
protection offered by programs built for this purpose. For the reason that IT
security experts developed antivirus software. The majority of actual software
is created to protect against all types of computerized threats, containing
worms, viruses, Trojans, and adware. In addition, exposure to contamination could be avoided through following some tips for example, not access folders or links
from unknown sources, and restricting access to possibly dangerous websites
(Kaspersky,2020).
In conclusion, combating
cyberattacks is not easy and will never end. In the future, with the
development of technology the
attacks becoming more stronger and harder to annihilate. Henceforth I will
aim attention at different computer security tools also, I want to find if Artificial intelligence will suffer damage due to cyber attacks. I have identified a few
companies that offer reliable antivirus software, for example, McAfee, Kaspersky
and Norton which I will study in profoundness.
Reference list:
Kaspersky AO (2020) Malware protection methods and techniques. [Online]. Available from:https: //encyclopedia.kaspersky.com/knowledge/malware-protection-methods-and-techniques/ [Accessed 26/01/2020].
Kaspersky AO (2020) Malware protection methods and techniques. [Online]. Available from:https: //encyclopedia.kaspersky.com/knowledge/malware-protection-methods-and-techniques/ [Accessed 26/01/2020].
Moir R ( 2009) Defining Malware FAQ.[Online]. Available from: https://docs.microsoft.com/en-us/previous-versions/tn-archive/dd632948(v=technet.10)?redirectedfrom=MSDN [Accessed 26/01/2020]
Vaidya R (2019) Cyber Security Breaches Survey 2019. [Online]. Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/Cyber_Security_Breaches_Survey_2019_-_Main_Report.pdf [Accessed 26/01/2020].
Wharton G (2019) Hiscox Cyber Readiness Report 2019. [Online]. Available from:https://www.hiscox.co.uk/sites/uk/files/documents/2019-04/Hiscox_Cyber_Readiness_Report_2019.PDF. [Accessed 26/01/2020].
As we discussed in class be careful of using too much quotation in your essay, you have to include some of your own response to what you are learning and where it is leading you in your project as a whole. The topic is fine and will give you plenty of facts and figures to discuss in your presentation, but remember to include some named examples to make your essay and therefore your presentation more robust.
ReplyDelete