ICT Application
After the entry of technology into the world of business, agreements and transactions have been established from anywhere in the world and very quickly. Thus, ICT has a great impact on our lives.
On the educational side: Boards, chalk, and heavy books were overloaded with a computer board containing all the educational courses, thus providing greater comfort to the student and introducing him to the world of development since childhood.
On the industrial side: The entry of ICT after the industrial revolution led to the development of the machines used and linking them to the web to send orders to them from different sectors.ICT has increased the productivity of industries and reduced the time required to achieve the desired goal.
In the political and military aspects: Information technology has played a major role in the power and dominance of the state. The major countries sought to develop means of communication and means of obtaining information about the enemy.
information security challenges in puntland
Viruses and worms
Viruses and worms are malicious software programs (malware) aimed at destroying an organization's systems, data and network. A computer virus is a malicious code that replicates by copying itself to another program, system or host file. It remains dormant until someone knowingly or inadvertently activates it, spreading the infection without the knowledge or permission of a user or system administration.
Drive-by download attacks
In a drive-by download attack, malicious code is downloaded from a website via a browser, application or integrated operating system without a user's permission or knowledge. A user doesn't have to click on anything to activate the download. Just accessing or browsing a website can start a download. Cybercriminals can use drive-by downloads to inject banking Trojans, steal and collect personal information as well as introduce exploit kits or other malware to endpoints.
Ransomware
In a ransomware attack, the victim's computer is locked, typically by encryption, which keeps the victim from using the device or data that's stored on it. To regain access to the device or data, the victim has to pay the hacker a ransom, typically in a virtual currency such as Bitcoin. Ransomware can be spread via malicious email attachments, infected software apps, infected external storage devices and compromised websites.
Exploit kits
An exploit kit is a programming tool that enables a person without any experience writing software code to create, customize and distribute malware. Exploit kits are known by a variety of names, including infection kit, crimeware kit, DIY attack kit and malware toolkit. Cybercriminals use these toolkits to attack system vulnerabilities to distribute malware or engage in other malicious activities, such as stealing corporate data, launching denial of service attacks or building botnets.
INSIDER ATTACKS
While most challenges of Cyber Security are external for businesses, there can be instances of an inside job. Employees with malicious intent can leak or export confidential data to competitors or other individuals.
This can lead to huge financial and reputational losses for the business. These challenges of Computer Security can be negated by monitoring the data and the inbound and outbound network traffic. Installing firewall devices for routing data through a centralized server or limiting access to files based on job roles can
Post a Comment