Cyber threat refers to a person who attempts to gain access into a computer system or information without proper authorisation by the use of a data communication pathway. Cyber threats are no unknown devil in the 21st century, private information being shared and leaked around the world is now normal, armies of countries and companies at large are being compromised as confidential data of armies are being shared with other countries and militant organisations followed by companies loosing confidential strategies and market plans, in other words big data is being shared continuously.
Steve Herrod, the Managing director, General catalyst and Ex-CTO of VMware also shared conceptual detail as to how hackers were getting more and more personalized when they target specific individuals in an attempt to access intricate information. An average cyber hacking organizations earns half a dollar in a time difference of every twenty-four hours over every controlled technological device. Big organizations like Google, Amazon and American defenses make million dollar investments into cyber security to prevent the outrageous number of attacks faced by them everyday.
Cyber threats can be classified into various categories such as those of –bot-network operators, foreign intelligence services, ransomwares, spear phishing, insiders, phishers, hacking elections, spywares, and terrorists –each of the following use different methods/techniques and target to gain data in a rather unauthorized manner with an intention to cause harm.
Ransomware in the cloud is a technique used by these attackers that target big organizations such as those of Britain’s National Health Service, San Francisco’s light rail network, and FedEx. Ransomware is a malware which breaches all computer defenses and locks down computer files using strong encryption, Hackers then demand money in exchange for the digital key to unlock their own data, attackers tend to attack victims whose encrypted data has not been backed up as this ensure the vulnerability of the company and ensures them a paycheck.
Spear phishing is another method used by attackers that uses artificial intelligence to articulate messages in an attempt to trick people to install malware or share their sensitive data. Both sides of the operation are using machine learning in an attempt to recognize and block a potential virus where as the hackers use it to gain permission from the users themselves using fake messages.
Cyber attacks have also been used in having rigged elections by attacking the voting booth process itself. As per research Russian organizations are said to have hacked/rigged the 2016 general presidential elections in the United States of America in multiple different American states. Hackers also tend to gain power to influence vulnerable general public into believing a certain party assuperior and coax them to deliver the vote in their favor.
Cyber-physical attacks are hazardous attacks that affect the general public on a large scale, hackers in this method of attack gains access into electrical grids, transportation systems and other infrastructures that are critical to a countries work flow. Future disruptions may lead to attackers hampering aircrafts, ships, and tanks taking control of these big machines causing disruptions on their fingertips.
Cyber is increasingly become a dangerous place to live in due to the increasing number of funds being invested into it on a daily basis. High security firms are being forced to spend millions of dollars to prevent any breach. Start-ups that are incapable of repelling these cyber attacks are falling prey to these bugs.
MIT Technology Review: Six Cyber Threats to Really Worry About in 2018. (2nd January 2018). Retrieved from- https://www.technologyreview.com/s/609641/six-cyber-threats-to-really-worry-about-in-2018/
What is Cyber security? (22nd December 2017). Retrieved from- https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security