100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 4 out of 12 pages.
Final Project: Briefing ProjectUniversity of Maryland University CollegeProfessor Philip Famelio,CCJS 390 6380 Cybercrime and security14thJuly 2019Getting hacked isn't just a direct threat to the confidential data companies need. It can also ruin their relationships with customers, and even place them in significant legal jeopardy.
With new technology, from self-driving cars to internet-enabled home security systems, the dangers of cybercrime become even more severe. Cybersecurity is the state of providing, protecting, and recovering networks, devices, and programs from any computer-related attack on a company or an individual.Cyberattacks could be threats to organizations, employees, and consumers. They may be designed to access or destroy sensitive data of the company or extort money from it. They could destroy businesses and damage people’s financial lives as well as their personal lives.The best defense for this would be a robust cybersecurity system with multiple layers of protection spread across computers, networks, and programs. However, only a robust cybersecurity system will not be enough fight against this threat, but we should make smart cyber defense choices.Many types of cyberthreats can lead to a company and its networks, but they generally fall into three categories. The categories are attacks on confidentiality, integrity, availability. Attacks on confidentiality include stealing personal identifying information, company secrets, and customer bank account or credit card information. This information could be sold on the dark web. An attack on confidentiality is the process of psychologically manipulating people into performing actions or giving away information. Phishing attacks are the most common of social engineering attacks. Phishing attacks usually come in the form of a deceptive email that tricks the user into giving away personal information.Attacks on integrity consist of personal or enterprise sabotage and are often called leaks. A cybercriminal will hack in and release sensitive information to expose the data and influence the
public to lose trust in that organization. A type of attack on integrity, are attacks where an unauthorized user infiltrates a network undetected and stays in the network for a long time. The intent of an APT is to steal company data but not harm the network. APTs happen most often in sectors with high-value information, such as national defense, manufacturing, and the finance industry.Attacks on availability is type of cyberattack aims to block users from accessing their data until they pay a fee or ransom. Typically, a cybercriminal will infiltrate the network and block you from accessing critical data, demanding for a ransom. Companies sometimes have to pay the ransom and fix the cyber vulnerability afterward so that they can avoid halting business activities. Malicious software is a type of attack on availability. It refers to software that is designed to gain access or damage a computer without the knowledge of the owner. Several common types of malware include spyware, keyloggers, true viruses, and worms.