Unit 4 – Task – Question 3

Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share online today. What information will hackers try to get in the future? What approaches do you think they will use?


The first computer virus was created in 1972, known as “the creeper virus”, which is a harmless application designed to replicate itself from computer to computer. Since then, new malware is created everyday and proved to be the easiest and most efficient way to spread on either LAN or online network. Over decades, both cyber-security and cyber-attack develop rapidly, each trying to out-perform the other, which can be described to be a cat-and-mouse game.

Currently, with the development of cloud-platform, we’re facing new form of cyber-attack. Cloud-platform allows us to store documents, data, information with a more convenient way by just signing up an account and move all the items into the cloud. We no longer carry USB device to transfer data from PC to PC or to store information, therefore, decrease the thread of being infected by virus through hardware devices connection. However, we’re exposed to new thread while logging in using unprotected browser or public Wi-Fi connection.

With the development of utilities on our mobile devices, people using their face ID or fingerprint for almost everything, from unlocking the device to access their bank account. This exposes ourselves to many threads for cyber-attackers. We’ve been told and informed countless cases of leaking private information through hacked mobile devices. As the law of nature, growth of cyber-attacks leads to increase of cyber-security solution, such as two-factor authentication, encrypted password, CAPTCHA, biometric security. Don’t wait for too late for self-protection, the risk is real!

+ There are no comments

Add yours