threats of Cybersecurity
Nicole Perlroth (2020), ‘Officials Warn of Cyberattacks on Hospitals as Virus Cases Spike’ Retrieved From: https://www.nytimes.com/2020/10/28/us/hospitals-cyberattacks-coronavirus.html
Recently, the government has warned hospital officials on the need to protect themselves from cyberattacks in order to protect the COVID-19 patient’s information. The information could then be exchanged for ransom, as hospitals are liable for the information of their patients. The New York Times exposes the risk; a Russian attacker declared chaos as information could be illegally derived for personal gains. The article demonstrates the danger that hospitals and other organizations may be exposed in case such attacks. The article appeals to the logic of the reader as the cybersecurity attacks are illustrated well and the reason given for the existence of such attacks.
Sean IIIing (2017) ‘A cybersecurity expert on why you should be very worried about the internet’s future’ Retrieved From: https://www.vox.com/2017/7/26/15981824/internet-cybersecurity-net-neutrality-klimburg-the-darkening-web
According to a news article, Sean Llling takes on the worries about the internet and future threats. Cybersecurity is an issue being discussed extensively in the country as people have discovered the risk that the internet poses to their privacy. Countries have private information that is being protected from the public and hence the need to device security measures to help protect this information. For Example, nuclear power is now being controlled remotely by countries; if the information on how to activate nuclear materials falls into the wrong hands, there is bound to be tremendous effects. The article gives various examples including the US-Israel cyberattack on Iran that exposed the facilities available in 2012. The article is well articulated and assists the reader to understand the dangers of cyberattacks further.
Feng, Y., Huang, S., Chen, Q. A., Liu, H. X., & Mao, Z. M. (2018). The vulnerability of the traffic control system under cyberattacks with falsified data. Transportation research record, 2672(1), 1-11.
According to a survey done on cybersecurity, the author explores the vulnerability of systems and explains how the systems are susceptible to such attacks. The growth of the internet has further increased the exponential effects of the attacks as people are becoming more creative on internet platforms. Malwares are used as the primary tool to expose cyber users to the threats maliciously. The privacy of the users is increased as the signature systems that are extensively used are unable to detect more complex and new attacks. Also, software that could detect new attacks are slow and not as developed thus resulting in late detection of malwares. The article exploits the current situation appealing to the ethos of the reader on the dangers of cyber attacks due to lack of advanced technologies to protect people and organizations.
Stanciu, V., & Tinca, A. (2017). Exploring cybercrime–realities and challenges. Accounting and Management Information Systems, 16(4), 610-632.
According to cybersecurity experts, various reasons exposes people and organizations to risk including, weak credentials, giving too many permissions to people, back door on systems and other insider threats. Therefore, the threat may emanate from various sources and the higher the exposure, the higher the risk. Companies spend billions of shillings trying to protect themselves from breaches which might lead to complete failure of the business if important secrets to production are exposed. Hence, the article shows how businesses are exposed and the expenses accompanied by cybersecurity.
Russell, A. L. (2014). Cyber Blockades. Georgetown University Press.
Russel (2014) writes through her book on the effects of cyber attacks and related terrorism. The writer says that the attacks start with simple errors such as the mouse stopping to work, the computer refusing to take commands and the problems escalate. If the small issues are not resolved, the person or organization may be exposed to more risks of loss of information and other intelligence. Thus, terrorists are targeting governments and other delicate industries used in the manufacture of weapons and information for the government. The results of these attacks risk the life of the people hence the need to establish protection. The book is well incorporated and accurate to give examples.
April 28, 2020 ‘Hacked: The Bangladesh Bank Heist’ Retrieved from: https://www.youtube.com/watch?v=fP4YbGRBboE
The video demonstrates the risk of cyberattack as one of the banks in Bangladesh was invaded. More than eighty million dollars was stolen, and the crime was traced by a reported to Manilla and New York. The Heist was well organized, and experts say that no amount of weapon or security could have prevented the attack. The attack utilized cyber attacks and ensured they took control of the bank of Bangladesh without going in or out. The attack was completely computerized and the traces removed to ensure the money was untraceable. The documentary is well articulated involving experts who try to reconstruct the attack.