CMIT 495 Wk5_6 Group FINAL.docx - CYBERSECURITY THREAT LANDSCAPE 1 The Cybersecurity Threat Landscape Group Assignment CMIT 495 Current Trends and

CMIT 495 Wk5_6 Group FINAL.docx - CYBERSECURITY THREAT...

This preview shows page 1 - 4 out of 36 pages.

CYBERSECURITY THREAT LANDSCAPE 1 The Cybersecurity Threat Landscape Group Assignment CMIT 495: Current Trends and Projects in Computer Networks and Security Professor Arnold Webster By:
Image of page 1

Subscribe to view the full document.

CYBERSECURITY THREAT LANDSCAPE 2 The Cybersecurity Threat Landscape Group Project Functionality and security are inversely proportional. The most secure computer is the one that is not turned on and is not connected to a network, however, keeping a completely secure computer is not feasible. In our daily lives, we are connected to the internet, and use a variety of devices to achieve this connection. Users must be aware there are threats on the internet, and they are potentially vulnerable if they are not vigilant. We live in a generation where “There’s an app for that”, and users typically do not read the user agreement in which the users trust the app will keep their information private and secure and are surprised when it is hacked or their personal information is sold. Mobile attacks are on the rise. According to riskiq, “21,948 blacklisted mobile apps across 120 mobile app stores and the open internet. This equates to 1.5 percent of all new apps detected. Of those, 8,287 were detected in the Google Play store.” The increase of smart phone usage will continually rise. Illustration 1: ENSIA Threat Landscapes (ENSIA, 2019) Illustration 2: Global Attacks (NTTsecurity, 2019)
Image of page 2
CYBERSECURITY THREAT LANDSCAPE 3 Threat actors come in the form of state-sponsored, hacking organizations, or an individual at a home computer. These attackers have an agenda, whether it is purely financial, government or corporate espionage, or just for fun. 2018 and 2019 have had an increasing number of threats that are ever evolving in attempts to exploit their advisory for any number of reasons. The threat landscape in which we live today is changing, tools and automation, allow for more attackers to carry out serious attacks. Individuals and business are dependent on networked devices accomplish daily tasks which present an even larger target for potential attacks. “Cybercrime organizations have a clear vision of how they can make money, by either taking your data and selling it, holding it for ransom, or stealing CPU cycles. (Knowbe4, 2019)” Global Key findings proved that the Finance sector was the most attacked sector as it has been in the past. 35 percent of all attacks originated from IP’s within the US and China, and application-specific or web-application attacks accounted for over 32 percent of all hostile traffic. 73 percent of hostile attacks, fall into four categories: web attacks, reconnaissance, service-specific attacks, and brute-force attacks (NTTsecurity, 2019). In the USA, “attacks targeting Health Care in the Americas increased nearly 200 percent. Coin mining activity moved Education into the top five attacked sectors in the Americas. Russia ranked higher (number 3) against targets in the Americas than against any other region” (NTT Security, 2018).
Image of page 3

Subscribe to view the full document.

Image of page 4

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes