Cyber Security
Cyber Security
Cyber Security
Author
Affiliation
Instructor
Course
Due Date
2
As the world of cybersecurity continues to evolve and change over time, there is a need
to keep up with the changes to ensure that sensitive data is protected from cyberattacks.
However, it may be challenging to keep up with the changes because of the massive
cybersecurity threats, organizations and individuals need to stay updated on the latest
technological developments and trends. Criminals involved in cyberattacks are more advanced
with more sophisticated tactics. This has led to increased cases of data breaches. Some of the
current cybersecurity trends include the emergence of phishing, system piggybacking, cloud
security, and Internet of Things (IoT) security, among others. This paper examines cybersecurity
cyberattacks and ensure elasticity in computer network activities. One of the current trends in
cybersecurity is phishing. Data Breach Investigation Report (DBIR) shows that phishing
contributes to over 32 percent of data breach cases. Criminals involved in these activities have
used emails as an attack vector (Pandey et al., 2022). Moreover, reports indicate that these
criminals have been using strategies such as login details and personal information, among
others, to access their targets. Social media platforms, including LinkedIn and SMS and phone
calls, have exposed many individuals to cyberattacks. The typical examples of vishing that
continue to cause cyberattack vulnerability are social security scams and IRS calls, in which
specific individuals pretend to be Google attendants. The use of mobile phones has increased the
risks of cyberattacks because of the many apps that expose sensitive information to criminals
(Hussain et al., 2020). An excellent example of vishing is when a targeted person responds to a
3
call or calls back an automated number, providing automated guidelines that may expose
The Internet of Things (IoT) is an emerging information systems and technology trend.
City-wide infrastructure, smart homes, and even cars are the typical forms of the Internet of
Things currently on the rise. Internet of Things (IoT) technologies are access controls and
encryption. Business owners and consumers are at high risk of threats caused by the Internet of
Things. Individuals who strive to safeguard their assets fear the smart security systems being
removed from their homes by cybercriminals (Mandal et al., n.d). It is, therefore, advisable to
liaise with the right dealers while acquiring these systems to minimize vulnerability to cyber
criminals. Individuals are encouraged to use reputable plugins and applications to protect
themselves from cybercriminals. Moreover, as plugins and apps come with security patches, it is
Another potential cybersecurity trend is the system piggybacking. With this system, an
individual may launch a cyberattack by accessing another person's network without permission.
The system becomes accessible to hackers, allowing them to conduct illegal transactions without
being noticed. However, industries and countries have strategically identified ways of
monitoring data privacy through the formulation and implementation of the European Union's
General Data Protection Regulation (GDPR). Governments have enforced new legal frameworks
around data protection, ensuring firms comply with the set regulations (Mandal et al., n.d). In the
contemporary world, hackers have utilized piggybacking in various forms, mainly through
Bitcoin mining. Internet users, especially those in areas of high traffic, are advised to change
Despite being a crucial part of daily transactions, cloud security has given rise to new
security threats. Poor cloud security activities increase the chances of threats, including but not
limited to data breaches, ransomware, and malicious practices. However, with the emergence of
architects in cloud security, more emphasis has been placed on improving cloud security
infrastructure that prevents advanced attacks. Currently, cloud service providers have established
strategies for safeguarding data on servers. In this case, they have facilitated thorough
background checks to reduce threats related to insider attacks. Some of the latest developments
in cloud security include cybersecurity mesh, zero trust, and SASE framework that ensure access
In conclusion, the digital society believes that as technology continues to evolve, the
vulnerability of personal data increases. The global economy is at risk of cyberattacks because of
hackers' more advanced tactics to access sensitive information from individuals and
organizations. Areas of cybersecurity that have consistently evolved are phishing, system
piggybacking, cloud security, and the Internet of Things (IoT). These evolvements have created
chances for cybercriminals to victimize people by accessing and using their data for their own
gains. For instance, phishing is believed to contribute to over 32 percent of cases involving data
breaches. This means that a significant population has been victimized by cybercriminals, losing
money and assets to these individuals. Cybercriminals have further strategized in mobile apps
that allow them to access credit bank accounts, extorting vast amounts of money. This trend
harms the global economy. It is therefore vital for people and organizations to stay vigilant and
References
Hussain, A., Mohamed, A., & Razali, S. (2020, March). A review on cybersecurity: Challenges
Mandal, D. K., Singhal, N., & Tyagi, M. D. Cybersecurity in the Era of Emerging Technology.
Pandey, A. B., Tripathi, A., & Vashist, P. C. (2022). A survey of cyber security trends, emerging
pp. 19–33.