The response must be 200 words and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been published within the last five years. Acceptable sources include texts, articles, presentations, the Bible, blogs, videos, etc.
Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.
Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.
Cyber-attacks occur daily and are constantly evolving. In the past quarter century alone, cyber attacks have evolved from tiny hacks created by high-school students to state-sponsored attacks compromising presidential elections (Rid & Buchanan, 2016). Cyber-attacks can be conducted by either an insider or outsider source. One example of an insider cyber-attack occurred between 1976 and 2006. For over 30 years Greg Chung of Boeing stole over two billion dollars’ worth of aerospace documents and gave them to China (Uma & Padmavathi, 2017). During the investigation, over 225,000 pages of sensitive material were recovered in Chung’s home. This cyber attack is considered one of the largest insider attacks in history with malicious intent to supply China with proprietary military and spacecraft intel (Uma & Padmavathi, 2017).
Top Cyber Threats
There are multiple cyber threats that we face today. The top three cyber threats we are facing today are social engineering, ransomware, and third-party software exposure. Social engineering attacks exploit social interactions to gain access to valuable data. With social engineering, cyber criminals’ trick and manipulate their targets into taking certain actions, such as bypassing security measures or disclosing certain sensitive information (Rid & Buchanan, 2016). Ransomware attacks infect networks and hold data and computer systems hostage until a ransom is paid. Ransomware is among the top 10 cyber-attacks and is a popular way for attackers to target businesses (Rid & Buchanan, 2016). Lastly, many retailers use third parties for services such as payment processing. Even if a company does not directly handle personal information, including social security numbers or credit card numbers, a third party can put them at risk. With malware, hackers can steal data through third-party vendors, as they did in the Target malware attack in 2013 (Rid & Buchanan, 2016). Furthermore, significant changes have occurred in the realm of cyber security from the inception of cyber.
One of the significant changes that has occurred within the realm of cyber security is technology advantages. The rate of cybercrimes have grown exponentially and is consistent with the growth of technology. As technology expands and develops, so do the cybercrimes that are committed (Rid & Buchanan, 2016). Therefore, developing technology affects cyber security. One way developing technology has changed cyber security is through corporate security breaches. The majority of these corporate security breaches occur when hackers exploit employees through social engineering and scams. With advancements in technology, hackers are becoming more skilled at finding holes and cracks in corporate security systems and can gain access to protected files and data, posing a significant cybersecurity threat (Rid & Buchanan, 2016).
Most Significant Threat
While it is difficult to accurately predict the most significant threat, we will face in the future based on cyber threat, one aspect that needs to be discussed is the pandemic. With the pandemic, more individuals have been working from home. With individuals working from home, there is an increased risk of security breaches.
Cyber-attacks can be viewed as stealing of property. From a biblical worldview stealing is a sin. One Bible verse states, “Anyone who has been stealing must steal no longer, but must work, doing something useful with their own hands, that they may have something to share with those in need” (King James Bible, 1796/2020, Ephesians 4:28).