Computer Sciences and Information Technology
Security Threats
Read Top Ten Security Risks for 2019 (Links to an external site.) and research three security threats using credible sources (scholarly journals and articles). In a two- to three-page MS Word document, be sure to:
• Be sure to:

o Identify and describe the three security threats you selected.
o Describe how the threat manifests itself?
o What security mechanism would you use to mitigate each threat?

Security Threats
The nature of security threats in recent decades has shifted from being entirely physical to online threats. The increased use of the internet coupled with the high rates of its advancement has given birth to both positives and negatives. The recent study Cisco showed that cybersecurity is what organizations should watch out for which creates the need to increase protection and prevention measures.
Among the top 10 security risks identified were hacking, insider threats and the Internet of Things (Kingori, 2019). Hacking is the attempt to illegally get into a computer system or private networks without the knowledge or authorization of the owner. The main aim of the hackers is to break into the systems to alter or steal the information. There is a financial gain attached to hacking into the systems which act as the motivation behind the criminal activity by the hackers. For example, breaking into the banking systems and stealing credit card information or altering the banking systems can allow a hacker to transfer money without the knowledge of the bank.
Internet of Things (IoT) is among the newest technologies that enable communication between computing devices and systems (Jie et al., 2013). It is possible to transfer data across networks without the need for human-to-human interactions. Today, many homes in affluent communities make use of smart home technology which is only made possible by the IoT. The technology allows the communication between the electricity systems and the owner’s mobile device such that by the click of a button on the mobile phone, a homeowner can switch off the lights at home even when miles away. Insider threats refer to malicious attacks on the computer systems of an organization by people within it. It could be the current or former staff or associates with inside information about the systems and security practices of the organization.
Hacking involves an unknown person behind a computer who gets into the systems of the target and retrieved information that is then used to alter or to manipulate the target. The hacker may choose to blackmail the target and request for a ransom when they get hold of very sensitive information. An IP address could be all the hacker needs or an obvious password for them to get into the systems. IoT involved the storage of a lot of personal information into the systems. A hacker gets into the systems and retrieves data such as the current location of a homeowner and then plans on a home break when the owner is away. Insider threats are very common when a mole gives out organizational passwords of the rivals who then hack into the systems causing damage which will slow down the growth (Dalal, & Gorab, 2016). The rival company then gets an opportunity to grow and pass the target company which happens mostly with business empires.
Cybersecurity threats have a major common cure that works across all the existing threats. Training employees on the safe use of the internet and the computer systems should be the top priority measure which will work as a preventive action (Gunkel, 2018). The other most important action that companies should take is adhering to the cybersecurity both the national and organizational cybersecurity standards. For example, using a two or three-step authentication process and not sharing passwords should be strictly used and sanctions put in place for any employee that breaks the rules. Lastly, it is important to invest in computer systems that can detect and warn of an incoming threat which with the help of the well-trained staff will save the company from the damage of the attack.
It does not matter whether a company or an individual has faced a cyber-threat before or not, the reality is at one point, they will be open to the dangers. It is necessary to put heavy preventive measures to avoid the damage that could be caused by a cyberattack.

References
Dalal, R. S., & Gorab, A. K. (2016). Insider Threat in Cyber Security: What the Organizational Psychology Literature on Counterproductive Work Behavior Can and Cannot (Yet) Tell Us. In Psychosocial Dynamics of Cyber Security (pp. 122-140). Routledge.
Gunkel, D. J. (2018). Hacking cyberspace. Routledge.
Jie, Y., Pei, J. Y., Jun, L., Yun, G., & Wei, X. (2013, June). Smart home system based on IoT technologies. In 2013 International Conference on Computational and Information Sciences (pp. 1789-1791). IEEE.
Kingori, D. (2019, January 17). Top 10 Cybersecurity Risks for 2019. Retrieved from https://www.uscybersecurity.net/risks-2019/

Published by
Essays
View all posts