0% found this document useful (0 votes)
13 views4 pages

Viva Answers Cyber

The document discusses cybersecurity and cybercrime. It notes that cybersecurity is important in today's technological world to protect against cyber threats like viruses, hacking, and identity theft. These threats can happen to anyone using digital technology. The document also outlines different types of cyber attacks like viruses, worms, and trojans. It discusses how skills in technical knowledge, risk assessment, incident response, and communications can be applied to cybersecurity projects. Factors that drove the author's interest in cybersecurity included the widespread existence of malware, vulnerabilities in cloud computing, and how human error accounts for most cyber attacks. Research findings highlighted things like how often cyber attacks occur and costs of data breaches.

Uploaded by

sonugodria
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views4 pages

Viva Answers Cyber

The document discusses cybersecurity and cybercrime. It notes that cybersecurity is important in today's technological world to protect against cyber threats like viruses, hacking, and identity theft. These threats can happen to anyone using digital technology. The document also outlines different types of cyber attacks like viruses, worms, and trojans. It discusses how skills in technical knowledge, risk assessment, incident response, and communications can be applied to cybersecurity projects. Factors that drove the author's interest in cybersecurity included the widespread existence of malware, vulnerabilities in cloud computing, and how human error accounts for most cyber attacks. Research findings highlighted things like how often cyber attacks occur and costs of data breaches.

Uploaded by

sonugodria
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1) In an increasingly technologically advancing world,

cybersecurity is becoming more and more important.Cybersecurity


is a technical discipline that responds to and protects against
all cybercrime. Cybersecurity locates threats and responds to
attacks against digital data, devices, and systems.

Cybercrime can exist in many forms and many things can count as
cyber threats or attacks. From viruses to hacking, identity
theft, piracy, and network intrusions. Any threat that exists in
the digital space can be considered a cybercrime. These threats
need specialized cybersecurity measures and individuals to
identify and resolve.

The main reason why I care about cybercrime is that it can happen
to anyone. More and more people today are using informational
systems and digital technology. This technology is susceptible to
cybercrime.

Getting knowledge about cybercrime and cybersecurity helps one to


avoid being a victim.

BEING ABLE TO LEARN AND PROTECT ONESELF IN THIS TECHNOLOGICAL ERA


WAS MY INSPIRATION AND NEED TO CONDUCT RESEARCH ON THIS PROJECT.

2) THE MOST INTERESTING FINDING IN MY RESULTS WERE THE TYPES OF


WAYS A PERSON CAN BE ATTACKED IN THIS TECHNOLOGICAL ERA, SOME OF
WHICH ARE AS FOLLOWS:

VIRUS- A computer virus is a malicious software program designed


to replicate itself and spread from one computer to another. It
has the ability to create copies of itself and spread to other
files, programs, or computers without the user's knowledge or
consent. Viruses are typically created with malicious intent and
can cause a wide range of harmful effects, such as data
corruption, file deletion, system instability, and unauthorized
access to sensitive information.
WORMS- Computer worms are malicious software that can replicate
themselves and spread independently from one computer to another
over a network, without the need for a host file or program. They
have self-replication, network-based spreading, rapid spread,
payload, malicious intent, and prevention.
TROJANS- Trojans are malicious software (malware) that disguise
themselves as legitimate software, files, or documents to trick
users into executing them. They can perform a wide range of
malicious actions once activated, such as data theft, system
disruption, remote control, installation of additional malware,
or facilitating other cybercrimes.

3) When working on a cybersecurity project one's academic talents


and professional skills can be put to use in various ways. For
example,
Technical knowledge: Understanding computer networks, operating
systems, programming languages and encryption methods.
Risk assessment: Assessing potential risk and vulnerabilities to
determine the best security measures to implement.
Incident Response: being able to detect and respond to security
incidents promptly and effectively.
Communications: Effectively communicating security risks,
recommendations, and incident response plan to stakeholders.

4) The fators that made me incline towards cybersecurity are as


follows:
More than 1 Billion Malware Programs Exist- There is more malware
(malicious software) online than ever before. Even the widespread
use of anti-malware and antivirus software hasn’t stopped the
spread of this persistent threat. There are more than a billion
malware programs out there, and more than a half-million
(560,000) new pieces of malware are detected every day. The most
common malware programs are Trojans, a type of malware that
disguises itself as legitimate code or software, which make up
58% of all computer malware.

The Cloud Is More Vulnerable Than we Think-Considering the growth


in the Internet-of-Things (IoT), perhaps one of the most
concerning items on our list of cyber security facts involves the
vulnerabilities of cloud computing. Nearly half of all data
breaches (45%) occur in the cloud, but organizations with a
hybrid cloud model which is a mixed computing model that combines
public and private clouds had lower average costs per breach, at
$3.80 million, than those with public ($5.02 million) or private
($4.24 million) cloud models.

Human Error Accounts for 95% of Cyber Attacks- One common thread
running through the cyber security threat landscape is the
undeniable fact that humans make mistakes. Research indicates 19
out of 20 breaches are the result of human error in some form.
This includes a range of human behaviors like downloading
infected software, weak or irresponsible password management or
failing to install software updates that contain critical
security patches.

5) Some of the results I came across during my research about


cybersecurity and it's crime which were most intriguing are as
follows:

Every 39 seconds there is a cyber attack


43% of cyber attacks target small business.
75% of cyber attacks start with an email.
The global average costs of a data breach is $3.9 million across
SMEs.
Since COVID-19 and the increase in staff working from home, the
FBI have reported an increase of 300% in reported cybercrimes.
The worldwide information security market is forecast to reach
$170.4 billion in 2022.
Most companies take nearly 6 months to detect a data breach, even
major ones.
On average, only 5% of companies’ folders are properly protected.
Data breaches exposed 36 billion records in the first half of
2020.
86% of breaches were financially motivated and 10% were motivated
by espionage.
4 million files are stolen every day - that’s 44 every single
second.
21% of files aren’t protected.
Cyber crime is quickly becoming more profitable than the illegal
drug trade.
Around 95% of cloud security failures are predicted to be the
customer’s fault.
Word, Powerpoint and Excel (the Microsoft office formats)
comprise the most prevalent group of malicious file extensions.
Email is the primary entry point of 94% of malware attacks.
Cyber crime is set to cost $6 trillion in 2021 - twice what it
was in 2015.
The Netherlands has the lowest cyber crime rate, whilst Russia
has the highest.

You might also like