CYBER SECURITY
With an increase in the revolution of the Internet of things (IoT), there are several attacks that are expected to happen in the next few years. The internet is becoming increasingly intertwined with national security, this raises the biggest and the most alarming cyber attack; state-sponsored cyber attack. Research shows that as cyber security risks and complexity increases, the resources needed to respond to them will also become more complex. According to some of the study participants, this will bring about security divides where some entities will not have the capability to deal with these threats properly because more the more complex the threat, the more complex the solution, and the more expensive it will be.
The targets of the emerging security threats is all the businesses that are adopting to the IoT technology, many of them may lack knowledge, experience, skills, and awareness of how to secure their devices effectively. Another target is the national government, seeing as it is also adopting to the IoT, the use of cyber wars and cyber arms to achieve political gains between the main political powers, may lead to major disruptions to the network and reduce the confidence that the internet users has in it.
The actors of these cyber threats are individuals, states, or groups with malicious aims and intents to take advantages of vulnerabilities in businesses and states with low or no security awareness and technological development to gain illegal access to information systems to access or affect data, devices, networks, and systems of their victims. These threat actors may be physically located anywhere in the world as long as they have internet connection. These types of attacks happen because the victim has vulnerabilities in their systems, or does not have a technological development that provides them with security to block out attackers. The impact of these type of attacks is loss of information and data. Sometimes these attackers use the sensitive data that they acquire as leverage to get what they want from their victims.

Published by
Essays
View all posts