IS Activity 2
IS Activity 2
Trends in Computer
Security Threats.
The threat landscape is constantly evolving. Cybercriminals are becoming
more sophisticated and the attacks are growing in frequency and severity.
This presentation will highlight the latest trends in computer security
threats.
AKSHAT RAO
TY BSc [CDS]
60
The Evolving Cybersecurity
Landscape
Cloud Adoption
1
Organizations are increasingly relying on cloud services.
This poses new security challenges, as data is stored and
processed in remote locations.
Mobile Devices
2
The rise of mobile devices creates new vulnerabilities.
Organizations need to secure mobile devices and the data
they contain.
Internet of Things
3
The proliferation of IoT devices expands the attack surface.
Securing IoT devices is crucial to prevent attacks and data
breaches.
Emerging Threats: Ransomware, Phishing, and IoT
Vulnerabilities
Ransomware Phishing IoT Vulnerabilities
Ransomware attacks are increasingly Phishing attacks are designed to IoT devices are often poorly secured,
common. Cybercriminals encrypt trick victims into giving up sensitive making them vulnerable to attacks.
victims' data and demand ransom for information. These attacks are often Hackers can exploit vulnerabilities
its release. disguised as legitimate emails or to gain control of devices and steal
websites. data.
Insider Threats: Protecting Against Human Error and
Malicious Actors
Human Error
Careless employees can inadvertently expose sensitive data.
Malicious Actors
This can occur through phishing attacks, weak passwords, or
Insiders can deliberately steal data or disrupt operations.
unauthorized access to systems.
These threats can be motivated by personal gain, revenge, or
ideolog y.
Advanced Persistent Threats (APTs) and Nation-State
Attacks
1 Advanced Persistent Threats 2 Nation-State Attacks
APTs are sophisticated attacks that target specific Nation-state actors often conduct cyberattacks to gain
organizations or individuals. They often use multiple intelligence or disrupt operations. These attacks can be
techniques to bypass security measures. highly targeted and destructive.
The Rise of Cryptojacking and
Cryptocurrency-related
Crimes
Cryptojacking
Cryptojacking is the unauthorized use of a computer's
1 resources to mine cryptocurrency. Victims may not be
aware their devices are being used for this purpose.
Cryptocurrency Scams
Cybercriminals exploit the popularity of cryptocurrencies to
2 defraud victims. Common scams include Ponzi schemes and
phishing attacks.