Unit 4_Question 3


  1. Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share online today. What information will hackers try to get in the future? What approaches do you think they will use?

First and foremost, some hacking methods in review in the recent history as learned lessons are malware, hacking, online scams, phishing emails, fake news to name a few. Computers will probably always be around and that means unfortunately that cyber criminals will be around as well and more sophisticated. Therefore, it is an ongoing race between cyber criminals and white hat hackers. They are becoming smarter and cyber criminals are too. However, cyber criminals tentatively have more incentives to think about novel approaches to serve their needs and purposes so it is a big challenge for cyber security experts to take proactive measures to deal with and mitigate damages and loss.  Intentionally, many hackers think that breaking into a security system is a sign of how mart they are. It is certain that the most common crime is cyber criminals try to steal credit card information, sell fake credit cards and personal information to withdraw money, buy things using the name of the person whose identity had been stolen. They can also hack companies’ or individuals’ email accounts for fraud. Other criminals set up a website called Silk Road, a secret marketplace for illegal goods and there are in the future such more and more black websites or even a secret hacking company. At school, students hacked into professors’ databases and changed grades, so they are likely to hack schools’ management system as well. In the recent years, stealing patent or copyright of newly-unreleased films, music or works of art is potential. On a higher and more serious level, we will witness hacking companies’ system, banking systems, even countries’ military defense system risking to national security. Ultimately, cyber experts have kept on such measures to prevent cyber attacks as using strong passwords, passphrases, hashing passwords, multi-factor or two-factor authentication, and more reliable biometric security. In the future, cyber criminals can be that they use AL to support or search for weakness in the computer programs victims are using to look for cyber fingerprints – clues left behind in the computer programs that have been broken into or a software to extract the victims’ identity from their online posted images. Overall, a piece of advice is always be careful what personal information users put online what files or links you choose to click on. To sum up, below is some extracts from cyber experts cited from a website (https://runpanther.io/blog/the-future-of-cyber-attacks-insights-from-charlie-riley/) for referent information about the future cyber criminals.

They all think that the fight against cyber criminals never stops and takes lots of efforts. They are quoted as saying as follows:

 

cyber-experts.png

+ There are no comments

Add yours