SlideShare a Scribd company logo
1 of 5
Download to read offline
Sri Lanka Institute of Information
Technology
Master of Science (Information Management) Degree Program
Social Computing
Class Activity 04
W.M.J.H. Fernando
MS18901290
2
List down and explain the main Cyber Security challenges faced in
Social Computing.
Explain the incidents with real world examples and good practices
to experience the minimum damage.
Computer network is a collection of computers which are connected. It can be using wires
or wireless. The internet is the global network connecting thousands of networks spanned
across the globe. Normally internet is opened to anyone who has a need to connect to it.
There are IT security is very essential.
Cybersecurity is the defense of computer systems from theft of or damage to their
hardware, software or electronic data, as well as from disruption or misdirection of the
services they provide [1].
The cyber security there are several challenges faced in social computing. The year 2017 saw
some of the biggest cyberthreats in recent history. There are millions of consumers and
thousands of businesses affected by everything from the WannaCry attack. It spread through
the computer network. Other challenges are, [2] [3]
• Big data, big breaches
With more and more data being collected, transmitted and used daily, compromising the
security of personal information is a growing business. Cyber criminals will continue to see
personally identifiable information as a source of value. With so many companies storing
data in the Cloud, watch for more ransomware attacks that will target Cloud breaches.
Example: [4]
3
• AI Expansion
Robots might be able to help protect against incoming cyber-attack. Between 2016-2025,
businesses will apply almost $2.5 billion on AI to avoid cyberattacks.
Timing is the whole thing with malware and other malicious data manipulations. For
instance, it could fight a virus as it was downloading, also have a much better chance of
mitigating its forceful impact.
• Limited IT Resources
Another cybersecurity challenge schools face when protecting their networks from attacks
is a lack of IT resources. The existing cybersecurity skills gap means there is a lack of
obtainable professionals equipped to deal with the danger landscape schools aspect. It’s
terrible for the limited IT resources and personnel at schools to monitor every device and
request to the network. As even more devices require access to the network, carrying
applications with varying steps of security, and digital transformation changes infrastructure
and resources to the cloud, IT teams will need to join security solutions that provide network
visibility across spread environments combined with automation if they want to keep pace
with cybercriminals. [5]
4
• IoT Threats
Most people nowadays using new technological devices. So that 84% of American
households, for case, have at least one smartphone. 80% have at least one desktop or laptop
computer. 68% have at least one tablet. And 39% have at least one streaming device.
The problem is that all that interconnectedness makes customers highly vulnerable to
cyberattacks. In detail, one study revealed that 70% of IoT devices have serious security
vulnerabilities. Exactly, insecure web interfaces and data transfers, insufficient
authentication methods, and a lack of customer security knowledge permission users open
to attacks. There is main reason is all there are devices are interconnected and at one time
access all these devices. In most of time risk happen password requirements, user
verification, time out sessions, two factor authentication and other sophisticated security
protocols.
5
• Serverless Apps vulnerability
Serverless Apps vulnerability is another challenge in cybersecurity. There is customer
information is particularly at risk when users access others application off server or locally
on their device. Serverless apps are most common as web service and data processing tools.
Technology use only continue to raise, and with it, the attack surface that makes
organization vulnerable. To allow technology use and the invention it provides without do a
deal security, organization must be aware and plan to mitigate these cybersecurity
challenges.
References:
[1] “Computer security,” Wikipedia. 30-Aug-2018.
[2] “5 Cybersecurity Challenges and Trends: What to Expect in 2018.” [Online]. Available:
https://www.globalsign.com/en/blog/cybersecurity-trends-and-challenges-2018. [Accessed: 05-Sep-
2018].
[3] Dcode, “The Top Cybersecurity Challenges of 2018,” Dcode, 26-Jun-2018. .
[4] T. Armerding, “The 17 biggest data breaches of the 21st century,” CSO Online, 26-Jan-2018. [Online].
Available: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-
21st-century.html. [Accessed: 06-Sep-2018].
[5] S. Biddle, “Three of the Biggest Cybersecurity Challenges Facing the Education Sector,” Fortinet Blog, 13-
Dec-2017. [Online]. Available: https://www.fortinet.com/blog/business-and-technology/three-of-the-
biggest-cybersecurity-challenges-facing-the-education-sector.html. [Accessed: 06-Sep-2018].

More Related Content

What's hot

Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE
 

What's hot (20)

Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021Top Cybersecurity Trends of 2021
Top Cybersecurity Trends of 2021
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 

Similar to Class activity 4

DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
HateMe9
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
ijtsrd
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 

Similar to Class activity 4 (20)

How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisCyber Attacks and Crimes in Cyber Security: A Comparative Analysis
Cyber Attacks and Crimes in Cyber Security: A Comparative Analysis
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 

More from Jeewanthi Fernando

More from Jeewanthi Fernando (20)

Assingment 5 - ENSA
Assingment 5 - ENSAAssingment 5 - ENSA
Assingment 5 - ENSA
 
Assingment 4 - DDos
Assingment 4 - DDosAssingment 4 - DDos
Assingment 4 - DDos
 
Assingment 3 - Bug bounty
Assingment 3 - Bug bountyAssingment 3 - Bug bounty
Assingment 3 - Bug bounty
 
Assingment 2 - Law
Assingment 2 - LawAssingment 2 - Law
Assingment 2 - Law
 
Assingment 1 - Google haker
Assingment 1 - Google hakerAssingment 1 - Google haker
Assingment 1 - Google haker
 
Ob group presentation
Ob group presentationOb group presentation
Ob group presentation
 
OB group assignment
OB group assignmentOB group assignment
OB group assignment
 
Poster
PosterPoster
Poster
 
Assignment - Maliban
Assignment - MalibanAssignment - Maliban
Assignment - Maliban
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
BPM presentation
BPM presentationBPM presentation
BPM presentation
 
Business Process Management Doc
Business Process Management DocBusiness Process Management Doc
Business Process Management Doc
 
Group assingment
Group assingmentGroup assingment
Group assingment
 
Class activity 5
Class activity 5   Class activity 5
Class activity 5
 
Class activity 3
Class activity 3   Class activity 3
Class activity 3
 
Professional networking
Professional networkingProfessional networking
Professional networking
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Tesco doc
Tesco docTesco doc
Tesco doc
 
Tesco
TescoTesco
Tesco
 
ALSS Assingment 1
ALSS Assingment 1ALSS Assingment 1
ALSS Assingment 1
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Class activity 4

  • 1. Sri Lanka Institute of Information Technology Master of Science (Information Management) Degree Program Social Computing Class Activity 04 W.M.J.H. Fernando MS18901290
  • 2. 2 List down and explain the main Cyber Security challenges faced in Social Computing. Explain the incidents with real world examples and good practices to experience the minimum damage. Computer network is a collection of computers which are connected. It can be using wires or wireless. The internet is the global network connecting thousands of networks spanned across the globe. Normally internet is opened to anyone who has a need to connect to it. There are IT security is very essential. Cybersecurity is the defense of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide [1]. The cyber security there are several challenges faced in social computing. The year 2017 saw some of the biggest cyberthreats in recent history. There are millions of consumers and thousands of businesses affected by everything from the WannaCry attack. It spread through the computer network. Other challenges are, [2] [3] • Big data, big breaches With more and more data being collected, transmitted and used daily, compromising the security of personal information is a growing business. Cyber criminals will continue to see personally identifiable information as a source of value. With so many companies storing data in the Cloud, watch for more ransomware attacks that will target Cloud breaches. Example: [4]
  • 3. 3 • AI Expansion Robots might be able to help protect against incoming cyber-attack. Between 2016-2025, businesses will apply almost $2.5 billion on AI to avoid cyberattacks. Timing is the whole thing with malware and other malicious data manipulations. For instance, it could fight a virus as it was downloading, also have a much better chance of mitigating its forceful impact. • Limited IT Resources Another cybersecurity challenge schools face when protecting their networks from attacks is a lack of IT resources. The existing cybersecurity skills gap means there is a lack of obtainable professionals equipped to deal with the danger landscape schools aspect. It’s terrible for the limited IT resources and personnel at schools to monitor every device and request to the network. As even more devices require access to the network, carrying applications with varying steps of security, and digital transformation changes infrastructure and resources to the cloud, IT teams will need to join security solutions that provide network visibility across spread environments combined with automation if they want to keep pace with cybercriminals. [5]
  • 4. 4 • IoT Threats Most people nowadays using new technological devices. So that 84% of American households, for case, have at least one smartphone. 80% have at least one desktop or laptop computer. 68% have at least one tablet. And 39% have at least one streaming device. The problem is that all that interconnectedness makes customers highly vulnerable to cyberattacks. In detail, one study revealed that 70% of IoT devices have serious security vulnerabilities. Exactly, insecure web interfaces and data transfers, insufficient authentication methods, and a lack of customer security knowledge permission users open to attacks. There is main reason is all there are devices are interconnected and at one time access all these devices. In most of time risk happen password requirements, user verification, time out sessions, two factor authentication and other sophisticated security protocols.
  • 5. 5 • Serverless Apps vulnerability Serverless Apps vulnerability is another challenge in cybersecurity. There is customer information is particularly at risk when users access others application off server or locally on their device. Serverless apps are most common as web service and data processing tools. Technology use only continue to raise, and with it, the attack surface that makes organization vulnerable. To allow technology use and the invention it provides without do a deal security, organization must be aware and plan to mitigate these cybersecurity challenges. References: [1] “Computer security,” Wikipedia. 30-Aug-2018. [2] “5 Cybersecurity Challenges and Trends: What to Expect in 2018.” [Online]. Available: https://www.globalsign.com/en/blog/cybersecurity-trends-and-challenges-2018. [Accessed: 05-Sep- 2018]. [3] Dcode, “The Top Cybersecurity Challenges of 2018,” Dcode, 26-Jun-2018. . [4] T. Armerding, “The 17 biggest data breaches of the 21st century,” CSO Online, 26-Jan-2018. [Online]. Available: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the- 21st-century.html. [Accessed: 06-Sep-2018]. [5] S. Biddle, “Three of the Biggest Cybersecurity Challenges Facing the Education Sector,” Fortinet Blog, 13- Dec-2017. [Online]. Available: https://www.fortinet.com/blog/business-and-technology/three-of-the- biggest-cybersecurity-challenges-facing-the-education-sector.html. [Accessed: 06-Sep-2018].