And let’s not forget about Samsung Smart TVdisputes that could potentially listen to personal conversations and pass themon to third parties through the voice-activated feature. And then there weresecurity experts who revealed they could “throw away” a smart car andcontrol it. Fortunately, in all these examples, security experts have managedto prevent serious catastrophes by identifying problems early.
But with moreand more devices that connect to cyberspace through the term “Internet ofThings,” it’s only a matter of time before something goes wrong.In view of the above, the safety of theuser has been seriously damaging to serious disasters that have been identifiedas a problem. The new strains and adaptations of existingstrains of ransomware go into the wild every week and the total amount of moneythat does not resolve to ransomware distributors every year will shame theeconomies of many countries.We have already talked about how ransomwarehas become such an enormous endeavor that distributors even deal with issuessuch as customer satisfaction and customer service. This means that thesecriminals – like everyone who deals with business – think of long-term growth.As such, we can expect that ransomwareinfections will continue to grow in 2017, with more malicious emails trying tolure you into opening dangerous attachments, and watch out for criminalslooking for more creative ways to infect your computer. Also expect morecomplex strains of ransomware offering even more “features” that youusually expect to see in software that you have purchased legally! In 2016, the presidential elections in the US are prevailing, which inturn are buying the growing problem with fake news. While companies like Googleand Facebook have promised to deal with a wave of fake or misleading news, itis still a problem without a real clear decision.
The number of sites thatroutinely public fake news or “fake” news (fake news aboutentertainment or satire) have risen dramatically over the past few years andmany stories have received tens of millions of opinions and even misguidedpoliticians, celebrities and organizations. In this way, Internet credibilityhas eroded and will probably continue to do so when we enter 2018 2016 &17 was not a goodyears for many big companies that suffered a number of massive data breaches inwhich customer login and password information appeared. Companies like TescoBank, Verizon, Myspace and LinkedIn lost data in 2016, and the biggestbreakthrough in data affecting Yahoo with over 1 billion compromised accountswas also revealed in 2016, though it actually happened in 2013 So, although you can follow health security advice, your personalinformation is still vulnerable when large companies are being refuted by cybercriminals.
We can expect to see more violations and revelations when we sign in2018, which means it’s important to keep the tabs on whether any of youraccounts may have been compromised – and remember if you use the same passwordto more than one account then if your online account is compromised by databreaches, you need to change this password to any other place where you usedit. Government sponsored surveillance is a popular subject covered by themedia since the expiration of Edward Snow wood’s NSA in 2013, and governmentsand software companies are still struggling on topics such as encryption,that’s something we will hear a lot in 2018 Whatever happened inthe past, we expect security in cyberspace and safety incidents to become muchmore prevalent in the future, because more and more people are becoming “Computers Smart ” around the world; bad actors from very different speciesare becoming increasingly aware of cyberspace opportunities; connectivitybecomes more widespread and universal; more and more systems andinfrastructures go from mechanical / electrical control for electronic /software management; and man Cyber ??activities are expanding much faster thansecurity effort Open Questions on key issues here· Which organizations (in each nation) have to play roles the protection ofthe element of national affiliation?· Howstable or fragile are the major infrastructures contained in A national elementof the interests of every nation? This is one of the keys uncertainty in ourcurrent understanding of the security situation in cyberspace. Detailed insightinto the vulnerability of specific infrastructure in different countries isneeded to address this issue.· How to protect the trusted person? Our main security paradigm of localenclaves protected by firewalls protects against malicious outsiders but notnecessarily against malicious insiders within the firewall with all accessprivileges of a trusted member of the enclave.
As knowledge of hackingtechniques spreads among the population, unfavorable actions of maliciousinsiders are becoming more and more of a problem. We have not been discussinghere, but this is such an important threat that can provide full security incyberspace strategy. This is particularly important for very large protectedenclaves covering a large number of individuals; the more people in an enclave,the greater the chance that at least one of them is a bad actor We need to emphasize several points:Fifty years after ENIAC, the network has become a computer (parsing the slogan of Sun Microsystems “The Web isComputer “). In the future, security incidents and security of cyberspace in this network the environment will become much more widespread; cyber space security and safety incidents will have an impact on almost every corner of society. And the consequences of security and safety incidents in cyberspace can become much bigger. We are all together in this; weak links created by any one increasing a problem for all of us. Much more attention should be paid to user motivation for all classes ofusers, with the different approaches required for each class.
Insufficientreception by users and the use of security techniques and procedures are acurse of most of the previous attempts in cybersecurity. The problem goesbeyond all the usual categories. The most important issue of “roles andmissions” is important, both philosophical and pragmatically. The worldhas become much more complicated. This is a useful complexity, but with thiscomplexity emerged security and safety issues we barely begin to understand andappreciate.