Threats and The Future of Cyber Security
Cybersecurity is the protection of computers from the damage of the software and the theft of the data. Today, cybersecurity is one of the most important spheres of computer technologies, and its significance is expected to increase in the future. This paper examines security issues with ubiquitous data, mobile devices, and cybersecurity considerations and explains the future of cybersecurity in cloud computing and quantum computing.
Technological progress has led to the development of the Internet of Things (IoT) that became the new cybersecurity threat that required a solution. Such IoT devices as smartphones and tablets have already become ubiquitous, and IoT services have become pervasive. IoT devices are the cybersecurity concern because of poor data confidentiality and privacy; in the context of IoT, the user is not the only person who can have access to the device, as the device is also available for other authorized people (Abomhara & Koien, 2015). For example, every person who knows the passcode from iPhone could access the data, and getting access to the passcode is not a complicated task, as users usually do not pay much attention to its security. With the growing use of mobile devices, the issue of confidentiality and privacy becomes even more challenging; people use IoT devices to access the private data from almost everywhere, connect to public access points, and thus increase the risk for the damage or leaking of the data (Kerravala, 2015). Furthermore, IoT devices can become infected from the malware, and if a person connects the infected device to the business network, the device could transmit the infection and damage the network affecting the work of the company (Kerravala, 2015). IoT devices require specific attention due to the security threats that have to be solved in the nearest future.
Also, one of the most important areas of cybersecurity is cloud computing. Today, cloud computing continues to gain popularity, and more and more users store their data in the cloud to receive access to data from different devices and different places. At the same time, cyber-attacks become more complicated; the modern hackers use traditional tactics with innovative malware to bypass passive security measures based only on defense (O’Neill, 2018). The transition of cybersecurity to the cloud will significantly advance the quality of security systems. The cloud allows leveraging big data and instant analytics for a large number of end-users (O’Neill, 2018). It can also instantly react to already known threats and predict the upcoming threats that could damage the security system. Cloud security should be based on a collaborative environment. The collaborative environment tracks and predicts possible threats through a worldwide threat monitoring system and shares these threats among all users who leverage the same cloud.
Finally, cybersecurity is expected to change under quantum computing. On the contrary with traditional computers that use the binary system, quantum computers use qubits or quantum bits that can reside in more than one of two positions of the binary system (Bridgwater, 2017). Qubits significantly speed up quantum computers, and increased speed allows the calculation of complex mathematical equations. Indeed, the new generation of computers also requires advanced security measures. The higher speed could become useful for hackers, and the safe use of quantum computers requires the development of the quantum-safe cryptography (Bridgwater, 2017). Also, quantum computing can run the most complex quantum algorithms, and security strategists highlight that nobody can predict the range of possibilities of quantum computing (Bridgwater, 2017). Hackers could use quantum attacks to bypass security systems of the organizations, and the development of advanced quantum-resistant algorithms is necessary to protect the data (Bridgwater, 2017).
In the nearest future, cybersecurity is expected to change due to the rapid technological progress and the development of new computing areas. The main spheres that require the advancement of cybersecurity include IoT devices, cloud computing, and quantum computing. Security specialists need to pay attention to the vulnerabilities and security problems in these spheres to ensure the security and confidentiality of the data.
References
Abomhara, M., & Koien, G. M. (2015). Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks. Journal of Cyber Security, 4, 65-88. Retrieved from https://www.researchgate.net/publication/277718176_Cyber_Security_and_the_Internet_of_Things_Vulnerabilities_Threats_Intruders_and_Attacks.
Bridgwater, A. (2017). Five ways quantum computing will change cybersecurity forever. Raconteur. Retrieved from https://www.raconteur.net/risk-management/five-ways-quantum-computing-will-change-cybersecurity-forever.
Kerravala, Z. (2015). Mobile devices pose biggest cybersecurity threat to the enterprise, report says. Network World. Retrieved from https://www.networkworld.com/article/2974702/mobile-devices-pose-biggest-cybersecurity-threat-enterprise-report.html.
O’Neill, E. (2018). The future of cyber security is in the cloud. Gigabit. Retrieved from https://www.gigabitmagazine.com/cloud-computing/future-cybersecurity-cloud.
It might be interesting for you
- Tips on how to have a healthy and deep sleep during your exam period
- Compare and contrast essay
- How to get rid of the negative way of thinking
- What games will definitely grab your attention?
- Not listed/Other
- Superb electric cars you should know about
- The most luxurious places for students to live
- Argumentative Essay Sample: Lincoln’s Ten Percent Plan
Leave a Reply