image3 image1 image2 image3

You made it! |WELCOME TO Busy Type| Reach Greater Heights | Be Empowered | Grow beyond imagination

Dangers of the Increase in Cyber-attack


technology cyber network securityA huge concern among nations is the increasing rate of cyber-attack. Top American officials are suggesting setting basic international rules to curb future calamity. Businesses, government and individuals are under the endless wave of cyber-attack and it is apparent that none is winning the cyber-war. Hackers are increasingly gaining super-user privileges that enable them to do anything on a computer system or network they access. The gravity of impact grows as cyber-attack increases.
According to federal records obtained by USA Today, attackers successfully compromised the security of U.S Department of Energy computer systems more than 150 times between 2010 and 2014. 
The United States seems to be the most targeted country and also the number one source of cyber-attacks. Other countries at the top cyber-attack source are Germany, Mongolia, France, China and Bulgaria. Cyber-attack breaches security, destroys trust, confidence and alters data integrity. The shift from physical, brick and mortar institution to online and cloud computing has made cyber-attack more attractive. 

Also as efforts toward interconnecting and modernizing the electric grid continues, the anxiety of potential cyber-attack escalates. 

 

Who is the most exposed to cyber-attack?

The short answer is everyone. But here is the breakdown of the victims:

  • Universities and colleges - Symantec's Internet Security Threat Report noted that 10 percent of security breach involved the education sector in 2014
  • Energy and utility industry 
  • Financial and insurance Firms
  • Government
  • Manufacturing firms
  • Small businesses 
  • Services and non-traditional sector

Why the attack?

  • Universities and colleges are the abode of the brightest minds and ground-breaking research. The sophisticated hackers that have graduated from credit card theft. They no longer need just credit cards but ownership of the next scientific breakthrough, expensive research and access to numerous data of students (the country's future). Students' grade reports could also be changed.
  • Hackers would like to gain control of the nuclear power plant's computer system. The electricity grid is a huge interest of attackers because the nation could suffer a severe power outage or blackout if attackers intrude core grid network and systems.
  • The opportunity of tampering with bank balances, investment funds, 401k and other retirement funds to display wrong numbers.
  • Cyber-attacks want to access tax information, social security numbers, and highly private personal records.
  • Cyber espionage - this is a big one carried out by governments to acquire political and military information.
  • Another motive for cyber attack is cyber crimes like identity theft, drug trafficking, child pornography, fraud and harassment.

The aftermath 

Cyber-attack is a chain reaction that impacts the economy and the consequences include but not limited to:

  • loss of contracts by companies with security breach
  • damage of reputation
  • lack of trust and confidence among parties in a business like or pursuing similar interests (like banks and their customers) 
  • blackmail
  • loss of intellectual property, personal, business and public assets
  • expenses -cost of restoring compromised network systems and rebuilding infrastructure 


 

What's in it for you?

Demand for cyber security experts is on the rise. There are thousands of cyber security jobs with average of six-figure salaries being added to the labor market daily. This is an opportunity for anyone willing to add some cyber security skills to their resume to excel. This also provides a platform for you to help tackle cyber-attack. 

Sources: NBCNews, CNN, Utica College.



Share this:

CONVERSATION

0 comments:

Post a Comment