Wednesday, 22 January 2020

Essay

Combating cyberattacks

In this essay, I will show my research about how we can fight with cyberattacks and keep our technologies secure and viable. My view is focused on a small part of cyberattacks, more precisely on the attacks against the computer, most of those will be found on my major project, whose name is Security tools to combating cyberattacks. I will describe some types of cyberattacks in the first paragraph and the defenses against cyberattacks in the second paragraph. What grabs my attention is regarding the diversity of cyberattacks and how its strongest is increasing year by year becoming harmful.

In the last decade technologies era confront thousands of cyberattacks. According to the Hiscox Readiness Report in 2019, companies have reported cyber incidents have risen from 45% in 2018 to 61% in 2019(Wharton 2019). The Cyber Security Breaches Survey has shown around 32% of business and 22% of charities in The UK confronted with attacks or breaches, the most common attacks are phishing attacks, viruses, spyware, malware including ransomware attacks (Vaidya, 2019).
 "Malware is short for malicious software and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network, whether it is a virus, spyware, et al.'' (Moir R, 2009). Therefore, infection of malicious software can cause catastrophic damage. For example, a Trojan or a virus may delete important data, overload the network by DDoS(Distributed Denial of Service) attack, hardware failure and otherwise failure in the system functionality.  A large number of Trojan or viruses do not show their presence in the computer and the system can be operable, and they can produce damage without being detected(Kaspersky, 2020).

On the other hands these attacks led to the creation of software to protect against malicious software. According to Kaspersky (2020), we can use three methods, judicial, educational or technical. The judicial method consists of issuing laws that prohibit the distribution of programs that process cybersecurity. Over the years many people throughout the world were arrested for cybercrime, many cases remained unnoticed due to insignificant damage. The second method refers to protect via education if users are informing about how easy they could deviate from cyber law. Most often these two methods offer reduced safety it is recommended the protection offered by programs built for this purpose. For the reason that IT security experts developed antivirus software. The majority of actual software is created to protect against all types of computerized threats, containing worms, viruses, Trojans, and adware. In addition, exposure to contamination could be avoided through following some tips for example, not access folders or links from unknown sources, and restricting access to possibly dangerous websites (Kaspersky,2020).

In conclusion, combating cyberattacks is not easy and will never end. In the future, with the development of technology the attacks becoming more stronger and harder to annihilate. Henceforth I will aim attention at different computer security tools also, I want to find if Artificial intelligence will suffer damage due to cyber attacks. I have identified a few companies that offer reliable antivirus software, for example, McAfee, Kaspersky and Norton which I will study in profoundness.


Reference list:
Kaspersky AO (2020) Malware protection methods and techniques. [Online]. Available from:https: //encyclopedia.kaspersky.com/knowledge/malware-protection-methods-and-techniques/ [Accessed 26/01/2020].

Moir R ( 2009) Defining Malware FAQ.[Online]. Available from: https://docs.microsoft.com/en-us/previous-versions/tn-archive/dd632948(v=technet.10)?redirectedfrom=MSDN [Accessed 26/01/2020] 

Vaidya R (2019) Cyber Security Breaches Survey 2019. [Online]. Available from: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/Cyber_Security_Breaches_Survey_2019_-_Main_Report.pdf [Accessed 26/01/2020].

Wharton G (2019) Hiscox Cyber Readiness Report 2019. [Online]. Available from:https://www.hiscox.co.uk/sites/uk/files/documents/2019-04/Hiscox_Cyber_Readiness_Report_2019.PDF. [Accessed 26/01/2020].


1 comment:

  1. As we discussed in class be careful of using too much quotation in your essay, you have to include some of your own response to what you are learning and where it is leading you in your project as a whole. The topic is fine and will give you plenty of facts and figures to discuss in your presentation, but remember to include some named examples to make your essay and therefore your presentation more robust.

    ReplyDelete