Answer To: Sheet1 Self-Evaluation ScoreInstructor Score Introduction Requirement fully met Not Met...
Dr. Saloni answered on Mar 20 2022
Technology and Cybersecurity
Name
CRN:
Put the date and time submitted here
Technology and Cybersecurity
INTRODUCTION
Cybersecurity measures are intended to safeguard networked applications and systems against cyberattacks. Consumers can get their hands on technologies in one of two ways: by finalising and refining the products before they come on the market, or by adopting the popular approach of unleashing them often and earlier. As organisations take proactive steps to increase cyber security, the frequency of integrated hacking groups is expanding, and their techniques are becoming more audacious. Individuals are endangered when technology takes precedence over data protection (Casarosa, 2022).
There is a worldwide shortage of technology skills, and cyber security competence is specifically rare to pull by, since the position profiles are continually evolving to meet innovations in emerging technology as well as user expectations, along with legislation and laws. This implies that cyber security professionals must subsequently re-educate themselves and develop their strategy to prevent risks that may arise (Kshetri, 2021).
This paper focuses on the evolution, trends, issues, societal concerns, and application of technology in cybersecurity.
EVOLUTION
The development of cybersecurity has paralleled advancements in information technology. As technology advances, so do the aspects of cybercrime that are perpetrated. However, as technology has progressed, so has the potential to perceive and safeguard the populace from cybercrime before it occurs. It made a lot of progress, from basic cryptosystems to complex algorithms, everything for the sake of keeping communication and data safe (Leszczyna, 2018). During the 1960s, security was focused solely on physical aspects and limiting access to individuals who knew a lot about technology. The system had a password and multiple layers of security. Thomas created the first virus, which was inadvertent. In 1988, Morris Worm created one of the most significant turning moments in the history of cybersecurity. The use of internet technology has begun to rapidly expand. Security protocols had become too costly, culminating in the emergence of a new virus (Savaş & Karataş, 2022).
Its goal was to find defects in a network disruption blocking mechanism. In 1990, an increasing number of people became aware of the internet. They began to share their details online. Anti-virus software and firewalls were mass-produced in large quantities, and the researchers created a virtual firewall that has been constructed on the physical system to prevent fire from spreading inside the structure (Savaş & Karataş, 2022).
Antivirus software was developed to reduce the risk of cyber-attacks. In the year 2000, information security progressed as the number of internet users and utilisation expanded significantly, as did the number of viruses. Artificial intelligence and machine learning have now contributed significantly to the evolution of cyber security. Due to technological developments, botnets are now gathering significant information from computers, including addresses, names, financial data, age, online activities, and more (Leszczyna, 2018).
TRENDS
The first generation of artificial intelligence offensive technologies is now on the trend, and information about hackers employing AI is proliferating. Several entities, such as hardware, the cloud, ISPs, software, and the tool supply chain, are becoming increasingly reliant on a centralised underpinning technology and set of common services. A few of the mathematical issues upon which cryptography systems rely would be solved by a reasonably strong and error-resolved quantum computer. However, when utilised maliciously, it has the potential to impact the cryptographic underpinnings of the globe's network technologies, on which the online economy relies (Stewart Ferguson, 2022).
While next-generation identification systems become more widely available, society will become more reliant on their utilisation in essential applications. The high-value identification ecosystem is anticipated to be actively pursued by incredibly advanced threat actors who will take advantage of vulnerabilities in its various components....