Cyber Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

1

Trends in Information System and Technology: Cybersecurity

Author

Affiliation

Instructor

Course

Due Date
2

Trends in Information System and Technology: Cybersecurity

As the world of cybersecurity continues to evolve and change over time, there is a need

to keep up with the changes to ensure that sensitive data is protected from cyberattacks.

However, it may be challenging to keep up with the changes because of the massive

technological advancements experienced in the contemporary world. To effectively address

cybersecurity threats, organizations and individuals need to stay updated on the latest

technological developments and trends. Criminals involved in cyberattacks are more advanced

with more sophisticated tactics. This has led to increased cases of data breaches. Some of the

current cybersecurity trends include the emergence of phishing, system piggybacking, cloud

security, and Internet of Things (IoT) security, among others. This paper examines cybersecurity

as a trend in information systems and technology.

Cybersecurity revolves around techniques, expertise, and efforts tailored to mitigate

cyberattacks and ensure elasticity in computer network activities. One of the current trends in

cybersecurity is phishing. Data Breach Investigation Report (DBIR) shows that phishing

contributes to over 32 percent of data breach cases. Criminals involved in these activities have

used emails as an attack vector (Pandey et al., 2022). Moreover, reports indicate that these

criminals have been using strategies such as login details and personal information, among

others, to access their targets. Social media platforms, including LinkedIn and SMS and phone

calls, have exposed many individuals to cyberattacks. The typical examples of vishing that

continue to cause cyberattack vulnerability are social security scams and IRS calls, in which

specific individuals pretend to be Google attendants. The use of mobile phones has increased the

risks of cyberattacks because of the many apps that expose sensitive information to criminals

(Hussain et al., 2020). An excellent example of vishing is when a targeted person responds to a
3

call or calls back an automated number, providing automated guidelines that may expose

sensitive data such as credit card numbers.

The Internet of Things (IoT) is an emerging information systems and technology trend.

City-wide infrastructure, smart homes, and even cars are the typical forms of the Internet of

Things currently on the rise. Internet of Things (IoT) technologies are access controls and

encryption. Business owners and consumers are at high risk of threats caused by the Internet of

Things. Individuals who strive to safeguard their assets fear the smart security systems being

removed from their homes by cybercriminals (Mandal et al., n.d). It is, therefore, advisable to

liaise with the right dealers while acquiring these systems to minimize vulnerability to cyber

criminals. Individuals are encouraged to use reputable plugins and applications to protect

themselves from cybercriminals. Moreover, as plugins and apps come with security patches, it is

essential to seek site updates.

Another potential cybersecurity trend is the system piggybacking. With this system, an

individual may launch a cyberattack by accessing another person's network without permission.

The system becomes accessible to hackers, allowing them to conduct illegal transactions without

being noticed. However, industries and countries have strategically identified ways of

monitoring data privacy through the formulation and implementation of the European Union's

General Data Protection Regulation (GDPR). Governments have enforced new legal frameworks

around data protection, ensuring firms comply with the set regulations (Mandal et al., n.d). In the

contemporary world, hackers have utilized piggybacking in various forms, mainly through

Bitcoin mining. Internet users, especially those in areas of high traffic, are advised to change

WIFI passwords frequently and protect themselves against unauthorized access.


4

Despite being a crucial part of daily transactions, cloud security has given rise to new

security threats. Poor cloud security activities increase the chances of threats, including but not

limited to data breaches, ransomware, and malicious practices. However, with the emergence of

architects in cloud security, more emphasis has been placed on improving cloud security

infrastructure that prevents advanced attacks. Currently, cloud service providers have established

strategies for safeguarding data on servers. In this case, they have facilitated thorough

background checks to reduce threats related to insider attacks. Some of the latest developments

in cloud security include cybersecurity mesh, zero trust, and SASE framework that ensure access

and dynamic needs of enterprises are catered to (Pandey et al., 2022).

In conclusion, the digital society believes that as technology continues to evolve, the

vulnerability of personal data increases. The global economy is at risk of cyberattacks because of

hackers' more advanced tactics to access sensitive information from individuals and

organizations. Areas of cybersecurity that have consistently evolved are phishing, system

piggybacking, cloud security, and the Internet of Things (IoT). These evolvements have created

chances for cybercriminals to victimize people by accessing and using their data for their own

gains. For instance, phishing is believed to contribute to over 32 percent of cases involving data

breaches. This means that a significant population has been victimized by cybercriminals, losing

money and assets to these individuals. Cybercriminals have further strategized in mobile apps

that allow them to access credit bank accounts, extorting vast amounts of money. This trend

harms the global economy. It is therefore vital for people and organizations to stay vigilant and

uphold data privacy laws to prevent themselves from cyberattacks.


5

References

Hussain, A., Mohamed, A., & Razali, S. (2020, March). A review on cybersecurity: Challenges

& emerging threats. In Proceedings of the 3rd International Conference on Networking,

Information Systems & Security (pp. 1–7).

Mandal, D. K., Singhal, N., & Tyagi, M. D. Cybersecurity in the Era of Emerging Technology.

Pandey, A. B., Tripathi, A., & Vashist, P. C. (2022). A survey of cyber security trends, emerging

technologies, and threats. Cyber Security in Intelligent Computing and Communications,

pp. 19–33.

You might also like