And let’s not forget about Samsung Smart TV
disputes that could potentially listen to personal conversations and pass them
on to third parties through the voice-activated feature. And then there were
security experts who revealed they could “throw away” a smart car and
control it. Fortunately, in all these examples, security experts have managed
to prevent serious catastrophes by identifying problems early. But with more
and more devices that connect to cyberspace through the term “Internet of
Things,” it’s only a matter of time before something goes wrong.

In view of the above, the safety of the
user has been seriously damaging to serious disasters that have been identified
as a problem.

The new strains and adaptations of existing
strains of ransomware go into the wild every week and the total amount of money
that does not resolve to ransomware distributors every year will shame the
economies of many countries.

We have already talked about how ransomware
has become such an enormous endeavor that distributors even deal with issues
such as customer satisfaction and customer service. This means that these
criminals – like everyone who deals with business – think of long-term growth.

As such, we can expect that ransomware
infections will continue to grow in 2017, with more malicious emails trying to
lure you into opening dangerous attachments, and watch out for criminals
looking for more creative ways to infect your computer. Also expect more
complex strains of ransomware offering even more “features” that you
usually expect to see in software that you have purchased legally!

          
In 2016, the presidential elections in the US are prevailing, which in
turn are buying the growing problem with fake news. While companies like Google
and Facebook have promised to deal with a wave of fake or misleading news, it
is still a problem without a real clear decision. The number of sites that
routinely public fake news or “fake” news (fake news about
entertainment or satire) have risen dramatically over the past few years and
many stories have received tens of millions of opinions and even misguided
politicians, celebrities and organizations. In this way, Internet credibility
has eroded and will probably continue to do so when we enter 2018

                2016 &17 was not a good
years for many big companies that suffered a number of massive data breaches in
which customer login and password information appeared. Companies like Tesco
Bank, Verizon, Myspace and LinkedIn lost data in 2016, and the biggest
breakthrough in data affecting Yahoo with over 1 billion compromised accounts
was also revealed in 2016, though it actually happened in 2013

    
So, although you can follow health security advice, your personal
information is still vulnerable when large companies are being refuted by cyber
criminals. We can expect to see more violations and revelations when we sign in
2018, which means it’s important to keep the tabs on whether any of your
accounts may have been compromised – and remember if you use the same password
to more than one account then if your online account is compromised by data
breaches, you need to change this password to any other place where you used
it.

         
Government sponsored surveillance is a popular subject covered by the
media since the expiration of Edward Snow wood’s NSA in 2013, and governments
and software companies are still struggling on topics such as encryption,
that’s something we will hear a lot in 2018

                          Whatever happened in
the past, we expect security in cyberspace and safety incidents to become much
more prevalent in the future, because more and more people are becoming ”
Computers Smart ” around the world; bad actors from very different species
are becoming increasingly aware of cyberspace opportunities; connectivity
becomes more widespread and universal; more and more systems and
infrastructures go from mechanical / electrical control for electronic /
software management; and man Cyber ??activities are expanding much faster than
security effort

 

Open Questions on key issues here

·       Which organizations (in each nation) have to play roles the protection of
the element of national affiliation?

·      
How
stable or fragile are the major infrastructures contained in A national element
of the interests of every nation? This is one of the keys uncertainty in our
current understanding of the security situation in cyberspace. Detailed insight
into the vulnerability of specific infrastructure in different countries is
needed to address this issue.

·       How to protect the trusted person? Our main security paradigm of local
enclaves protected by firewalls protects against malicious outsiders but not
necessarily against malicious insiders within the firewall with all access
privileges of a trusted member of the enclave. As knowledge of hacking
techniques spreads among the population, unfavorable actions of malicious
insiders are becoming more and more of a problem. We have not been discussing
here, but this is such an important threat that can provide full security in
cyberspace strategy. This is particularly important for very large protected
enclaves covering a large number of individuals; the more people in an enclave,
the greater the chance that at least one of them is a bad actor

 

 

We need to emphasize several points:Fifty years after ENIAC, the network has become a computer (parsing the slogan of Sun Microsystems “The Web isComputer “). In the future, security incidents and security of cyberspace in this network the environment will become much more widespread; cyber space security and safety incidents will have an impact on almost every corner of society. And the consequences of security and safety incidents in cyberspace can become much bigger. We are all together in this; weak links created by any one increasing a problem for all of us.

         
Much more attention should be paid to user motivation for all classes of
users, with the different approaches required for each class. Insufficient
reception by users and the use of security techniques and procedures are a
curse of most of the previous attempts in cybersecurity. The problem goes
beyond all the usual categories. The most important issue of “roles and
missions” is important, both philosophical and pragmatically. The world
has become much more complicated. This is a useful complexity, but with this
complexity emerged security and safety issues we barely begin to understand and
appreciate.

 

x

Hi!
I'm Katy!

Would you like to get a custom essay? How about receiving a customized one?

Check it out