UNIT 4 – TASK – OPTION 3


3. Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share online today. What information will hackers try to get in the future? What approaches do you think they will use?

The Future of Cybersecurity in 2021 and Beyond: The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses in order to better protect their computer networks from intrusions. Cyberattacks not only are increasing in frequency, but they are costing victims larger financial losses. Much more results in the growing pace of cyberattacks than rampant migration to cloud storage and misconfigured cloud infrastructure. Still, misconfigurations in cloud infrastructure lead to data exposure and are among the biggest concerns for cyberthreats facing business and government agencies today

The types of information we store and share online today: When we are online, nothing is truly private. All we have to do is visit a website or use your smart phone and information about us is collected—information such as:

  • songs or plug-ins you’ve downloaded
  • your computer or phone’s technical configurations
  • addresses of previous sites you’ve visited
  • your email address
  • your location on your phone

The informations that hackers try to get in the future: Hackers illegally access devices or websites to steal peoples’ personal information, which they use to commit the crimes like theft. Many people shop, bank, and pay bills online. People also store financial information, like credit card or bank account numbers, on their devices. A hacker can do a lot of damage even if only one account or device is compromised

– Some approaches I think they will use: Hackers may install spyware by tricking you into opening spam email, or into “clicking” on attachments, images, and links in email messages, instant messages, and pop-up messages. Hackers use spyware to track keystrokes or acquire pictures of your device’s screen in the hope of snagging account numbers, passwords, and other sensitive information. Criminals can also hack individual websites—like email, social media, or financial institutions—and steal the information stored there.

+ There are no comments

Add yours