Answer To: CYB 250 Final Project Guidelines and Rubric Cyber Defense and Emerging Trends Paper Overview Threat...
Aditi answered on Jun 13 2022
Cyber Defense Trends
Personnel or Human factors in cybersecurity are activities taken when human errors cause a data leak. Hackers found a human-made weak link. Human errors account for 24% of cybersecurity issues, behind only Phishing/Malware (31%).
Social engineering education is part of human factor protection methods. It is the use of media to obtain confidential information. Spear phishing teaches staff about social engineering. Which phishing type has fewer victims but greater success? Highly customized mails can be easily delivered to a small group of potential victims to trick them through familiarity.
A hacker uses reverse social engineering to infiltrate network of companies and can easily claim to have unrevealed the hack's source. If his help is accepted, he will gain system access. Friendly Hacker targets internet and email accounts. A hacker will try to access PDFs, movies, and other items.
To justify the human component to a security analyst assessing a mid-size manufacturer entering the smart headset industry reinforces its message. Smart technology headsets can project crucial papers into an optical screen, causing human factor deficiencies.
Human aspects security concerns are challenging. Human error causes 52% of data and security breaches. A victim of spear phishing helped hack the DNC, Snapchat, and the healthcare industry last year. Unknowingly, employees may breach security. Homework raises employees' vulnerability to exploitation. These hazards have lately come to light due to government imposition of quarantine limitations. Nevertheless, they are also part of a bigger transition as organizations embrace digitization and new working practices. Elements of the human security include not repeating mistakes and anticipating attacks.
Here are some examples of rising human factor trends. Increased automotive hacking. In 2021, automobile hacking will rise. Modern vehicles have automated software for cruise control, engine timing, door locks, airbags, and driver support systems. These vehicles connect using Bluetooth and Wi-Fi, exposing them to attacks and weaknesses. Cybersecurity, AI This technology, along with machine learning, has significantly changed cybersecurity. AI has helped in order to build an automated defense system, NLP, facial detection and even help in danger detection. Threat detection systems enabled by AI can depict new assaults and promptly guide the administrators of any data breach. Also, Mobile banking malware attacks are up 50% in 2019, making our handheld devices a target. Cloud computing is risky. As more companies go to the cloud, data leaks must be monitored and updated. Google or Microsoft cloud apps are well-secured, but user errors, malicious software, and phishing assaults are widespread. The data breaches, IoT along with 5G networks, the automation and integration, targeted ransomware, state-sponsored cyberwarfare, and insider threats are the...