Current Concerns and Risks in Cyber Security: [Essay Example], 658 words GradesFixer
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Current Concerns and Risks in Cyber Security

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Download PDF

A risk-focused future

No one can deny that keeping up with the pace of change in this field is challenging at best, and can, at worst, feel impossible. As soon as you feel like you have a good handle on the major threats to your organization, three new threats pop up. So how can you keep up? If you want to stay ahead or even just keep pace, you need not only to understand the fundamental principles of a solid information security program but also to understand how to apply them to mitigate your organization’s specific risks.

Passwords are easy to steal

Phishing is a social engineering scam that involves obtaining login credentials of privileged insiders by posing as a trustworthy entity in an electronic communication. Most data breaches are traced back to phishing and the theft of login credentials that enable attackers to gain entry into proprietary systems.

Corporations are increasingly storing sensitive data in both public and private clouds, which creates new security concerns. Chief among the concerns are the security of data when migrating to the cloud, and the protection of data in a hybrid-cloud environment. Developers in particular are responsible for ensuring that custom applications do not accidently reveal critical data in public clouds. In 2018, more custom enterprise applications will reside in public infrastructure-as-a-service (IaaS) platforms such as those in AWS, rather than in private corporate datacenters. Cloud providers such as Amazon offer micro services to help secure customer data. However, enterprises still own the bulk of the responsibility for securing custom applications regardless of where they are hosted. Enterprises that utilize hybrid-clouds have to worry about how to orchestrate the complex balance between legacy and cloud-native infrastructure as well as ensure that the code in the apps they are releasing is not vulnerable once deployed.

DevOps failures lead to data-breachesIn 2016, Uber leaked the data of 57 million people. The data was hosted Amazon Web Services (AWS) and neither Amazon or Uber could protect it. Why? Because Uber’s contract-developers accidentally published code that included AWS keys on GitHub. The AWS login-credentials gave hackers access to privileged files on Uber’s AWS account. From a security perspective (not PR), Uber’s breach is both a reminder of the significance of what can happen when attackers breach a privileged account, and a reminder that development operations teams are often the first line of defense. Uber is not alone. Throughout 2017 a number of firms reportedly leaked sensitive data as a result of a common issue: developers misconfiguring AWS accounts for public access. Fileless cyber-attacks are on the riseRecent attacks including WannaCry, Petya, and Apache Struts all leveraged Fileless memory-based attacks to penetrate systems, hunt, and steal valuable data. Fileless and memory corruption tool-kits enable hackers to run malicious code or launch scripts directly from memory, infecting endpoints and their networks without a trace.

Leaked data shows up for sale on the dark web

The dark web is a hidden group of illicit and untraceable marketplaces. Average Internet users never see the dark web. This layer of the Internet is only accessible with specialized expertise and is the realm of criminals. Leaked data often shows up on the dark web and tracking its sale can help security analysts and law enforcement measure risk, remediate attacks, identify perpetrators, and more[image: ]Off-the-shelf web-attack-kits are also available on the dark web. These kits include tools for launching both distributed denial of service (DDoS) and web application based attacks. DDoS attacks are designed to flood a victim’s servers with enough requests to effectively take a website offline. Attacks can be customized and configured for almost any site, allowing a B-grade attacker to unleash a sophisticated and automated web-attack. IIoT attacks are becoming more severeUtilities and industrial companies have always been targeted due to the potential impact of an attack and their relative insecurity due to the general antiquity of these systems, especially when their industrial control systems (ICS) are connected to the Internet.

infoRemember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism-free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Current Concerns and Risks in Cyber Security. (2020, April 02). GradesFixer. Retrieved May 14, 2021, from
“Current Concerns and Risks in Cyber Security.” GradesFixer, 02 Apr. 2020,
Current Concerns and Risks in Cyber Security. [online]. Available at: <> [Accessed 14 May 2021].
Current Concerns and Risks in Cyber Security [Internet]. GradesFixer. 2020 Apr 02 [cited 2021 May 14]. Available from:
copy to clipboard

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.


    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you



    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer uses cookies. By continuing we’ll assume you board with our cookie policy.


    Haven't found the right essay?

    Get an expert to write you the one you need!


    Professional writers and researchers


    Sources and citation are provided


    3 hour delivery