Many other protocols and components such as malware

Many users use depend on Information and communication technologies.

It provide access to information through telecommunications such as internet, wireless networks, cell phones and other communication mediums.The first threats that is faced by technologies that will be discussed is the Internet threats. It uses multiple type of malware and fraud, all of which utilize HTTP or HTTPS protocols but may also employ other protocols and components such as malware attachments or on servers that access the web. The first caused is the malware. It is a malicious software that infects your computer such as computer viruses, worms, trojan horses, spyware and adware. According to CSA (2017), of the more than 400 malware variants detected in 2017, five were observed to have caused most of the infections.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
Writers Experience
Recommended Service
From $13.90 per page
4,6 / 5
Writers Experience
From $20.00 per page
4,5 / 5
Writers Experience
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

Malware can take control of your computer and intimidate you with scareware where a pop-up message will tell you that your computer has a security problem. In addition, they can reformat the hard drive of your computer causing you to lose all your sensitive information. By avoiding any malware threats, you can have automatic updates turned on to get security updates. The second caused is the keyloggers. It refers to a malicious computer program that captures and records your keystrokes and it is every word, character and button you press on your keyboard.

They can scrape up password, credit card and banking information, personal details and more to use for identity theft and other malicious deeds. According to Spring.T (2016), More than 100 compromised sites have identified but the number could be in thousands.

You can consider additional security tools like KL-detector as it is tool that will alert you to the keyloggers presence, but it is up to you to remove.The third caused is Rogue security software is. It is known as scareware which manipulates victims through fear. It often launches pop-ups window with false or misleading alerts that ask users to download trojan horses disguised as browser plug-ins or free service to steal your information.

You can install a firewall and keep it turned on to protect yourself from the rogue security softwareThe second threat faced by technologies that will be discussed is threats by email.Email is one of the most up to date electronic technologies with billions of messages sent every day. An email user is likely to encounter malware through email as it is the most common infection method as email users will receive malicious attachment or links to malicious web pages in their email and it has been increasingly used by hackers.Another caused of email threat is spam and phishing.

Spam is referred as junk mail that arrives on your doormat or in your post box. It can be dangerous, and it is more than just annoying as it is part of a phishing scam. Cybercriminals are trying to make money from the small percentage of victims that respond to the emails. They want run phishing scams in order to obtain passwords, credit card numbers, bank account details.

In addition, they want to spread malicious code onto recipients’ computers. You can set up multiple email addresses such as having one private email address for personal correspondence and another one is public email address for temporary address to subscribe to mailing list and any other internet services. Furthermore, you can use anti-spam filters by opening an email accounts with providers that include spam filtering.Another email threat is social engineering crime has become more and more common and it attacks by using simple tools like email to gather sensitive information or confidential data by building trust with the victims. One of the common social engineering attack is called email spoofing. They can pose as a trusted individual by falsifying the sender information shown in emails to hide the true origin and engages in a conversation to gain access to a company’s network and this will allow the attackers to take advantage of the victims to disclose their IDs, passwords and sensitive information, or fool them into performing a fraudulent transaction.

To avoid social engineering from happening, you should read your company’s privacy policy to understand under what kind of circumstances you can or should let a stranger into the building and you should also lock your laptop whenever you are not at your desk. Another email threat is Man in the middle attacks happens when a communication between two systems is intercepted by an outside entity such as email. The hackers not only trying to eavesdrop on your private conservations, they also target all the information inside your devices. They have found various ways to carry out the attacks and it has become cheap. One of the common type of man in the middle attack is email hijacking.

Hackers use this tactic email accounts of large organisations like the banks and financial institutions and once they have gain access to the important email accounts, they will monitor the transaction to make their eventual attack a lot more convincing. You can use different password for different accounts as hackers are likely to try one password they source from email in various accounts. In addition, always use quality email filter to avoid meeting a cyber-threat.The third threat that is faced by technologies that will be discussed is threats from using mobile devices.

The number of mobile phones users around the world will exceed to five billion by 2019. Your computer can be affect like viruses and spyware likewise your mobile device can be also affect with the different security threats. Mobile device is divided into several categories such as application-based threats, web-based threats, network-based threats and physical threats. One of the threat from using mobile device is ransomware. It is a form of malware that can affect the mobile devices by stealing sensitive data when the malware has downloaded into the mobile devices and it will show a fake message accusing the victim of unlawful engagement before encrypting file and locking the phone. After the payment is processed, the ransomware will send a code before unlocking the device. People can be tricked into downloading mobile ransomware through social media schemes.

According to Trend Micro (2017), there had already been over 235,000 detections for Android mobile ransomware in first half of 2017 alone. You can use a robust mobile security solution to safeguards your online privacy and it come with features like App Advisors which is able to check whether the Android apps is safe to download. In addition, you must back up all files so that when your device is held for ransom, you would not lose or damage your phoneAnother caused is unsecured Wi-Fi Public Wi-fi is available everywhere, from coffee to hotels and malls. Most of the public networks are legitimate but not secure as there are many fake networks as well.

Although public Wi-fi has made our lives a little easier but it can also cause risk to your personal information available on your mobile devices as you may require making an account by filling out an online form. This make it easier for the attackers to gain email addresses and passwords, as well as monitor your internet usage. According to Norton Cyber Security (2016), 19% of people in the US never use a VPN when connect to public Wi-Fi. You can create unique passwords for every new account you create when using your mobile devices because hackers tend to think that victims uses the same password for everything. Another caused is Drive-by downloads.

It works by exploiting vulnerabilities in web browsers, plug-ins or other components that work within browsers. On mobile devices, there usually little or no mobile antivirus protection so users will click on malicious in text message when it pops up on the screen. The most common mobile drive-by downloads are exploiting mobile browser vulnerabilities. They enable crooks to remotely run commands within the phone’s operating system and change the ways it works. You must make sure that your mobile operating system and application are up to date and make sure you have a proper mobile antivirus protection on your phone to safeguard your mobile device.

The fourth thread that faced by the technologies that will be discussed is cloud. According to networkworld (2017), We expect 2018 will see more individual and state-sponsored attacks aimed at undermining the security of cloud infrastructures. The first caused is data breaches. It happens daily, in too many places at once and it might be the primary objective of a targeted attack or simply the result of human error or poor security practices. It might involve any kind of information that was not intended for public release such as personal health information, financial information, personally identifiable information and intellectual property.

The second caused is denial of services. It is simple for attackers to execute if they have control of a botnet and it is growing in popularity on the dark web. It is an attack method used to deny access for legitimate users of an online service and the service could be a bank or any other type of network service.

An attacker can make a fake request look like random garbage on the network and make the attack look like the exactly like a real web. On the other hand, if the attack has sufficient computing resources at their disposal, they can direct enough traffic to overwhelm the target’s bandwidth. You can use an intrusion detection system to protect system for this attacks by using connection verification methods and by preventing request from reaching enterprise servers.

Furthermore, the system can also be configured to detect a threat and take corrective actions to prevent it.Malicious insidersThe third cause is malicious insiders. It can threaten the confidentiality, integrity and availability of cloud’s system data and services. T.


Best Practices: Securing Your Mobile Device. Retrieved from https://www.trendmicro.

com/vinfo/ph/security/news/mobile-safety/best-practices-securing-your-mobile-deviceBlaisdell, R. (2015, March 16). How to counter DDoS attacks in Cloud Computing. Retrieved from, V.

(2017, June 28). Keyloggers: Beware this hidden threat. Retrieved from

(2018, June 19). Cyber threats in Singapore grew in 2017 mirroring global trends. Retrieved from

sg/news/press-releases/cyber-threats-in-singapore-grew-in-2017-mirroring-global-trendsB. (n.d.

). Mobile drive-by downloads – Dangers and safety measures. Retrieved from

(n.d.). Public Wi-Fi is not as safe as you think. Retrieved from

htmlF. (2018, August 01). The Dangers of Using Unsecured Wi-Fi | How Bad is it, Really? Retrieved from https://www. (2018, January 23). Threats to Your Mobile Device Security – Hacker Noon.

Retrieved from (n.d.

). What is Spam and a Phishing Scam – Definition. Retrieved from

You Might Also Like

I'm Alejandro!

Would you like to get a custom essay? How about receiving a customized one?

Check it out