A Brief Overview of the current threat landscape

Name: Isis Jordan

Date: January 12, 2019

Details

Most people do not understand the importance of Cybersecurity. When on social media they openly share their Name, age, DOB, phone number, and sometimes even their home address. That makes it easy for people in the hacking world to access their information. Facebook is a good example. People think it is a secured site, but I know when I am looking up something on the internet to shop, and when I go on Facebook ads are constantly popping up showing the product, I looked at previously. That is something that catches the user’s attention and then can become a click bait. With that can launch a faulty site to release a software that could potential take over the user’s computer to gain access to any personal information, and to even cause damage to the user’s computer. Also is why applying or downloading a virus protection to your laptop is important to prevent hackers from gaining access to personal information. But hackers can gain access easily from many other things. Inside attacks is a big problem. Someone that works inside a secured facility or has any administrative access to valuable information can be a huge problem. Especially when that person misuses their access to gain control. I have witnessed this before first hand when working for a small company. It can affect anyone who has given the company their personal information and that includes their personal address, phone numbers, and even their social. Because once the internal person is able to access personal files, they can manipulate the information to gain from, and that can be in any form to benefit them like access to more money. Also, with the company I was with an ex-employee still had access to the system and from there they were able to gain everyone in my departments emails to email us about how and why they got fired and continued to threaten the manager of the department. That also shows how easily an ex-employee can access and threaten the company if their credentials are not taken away immediately after being terminated. Cyber threats lie everywhere, and people do not realize how easy it can be to be hacked. But need to take the proper preclusions to prevent it as much as possible whether it be for personal or business use.

 

 

References

page2image3719936

Tutorial 2: Introduction to Cyberthreats.”

About STTR | SBIR.gov, www.sbir.gov/tutorials/cyber-security/tutorial-2.

1 comment

  1. Hi, this is a comment.
    To get started with moderating, editing, and deleting comments, please visit the Comments screen in the dashboard.
    Commenter avatars come from Gravatar.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.