This article is about the very serious issue of hacking. The issue of hacking is becoming more of a common trend especially from countries like Russia and China. The writer of the article talk about past attacks and the threat of more hacks from Russia against the U.S. These hacks have targeted U.S power companies and have the potential to be very dangerous and even kill people so the U.S must be on high alert. Due to the potential severity of these hackings, the U.S should take some precautions to prevent/protect us from them such as securing local networks, implementing sanctions on Russia, detecting these hacks early, and having increased IT support for companies. All of these measures will help prevent attacks and limit the damages if they do occur.
This article involves the issue of spoofing as a former Bank of America Trader pleaded guilty to spoofing as he placed fake market orders so that he could make a better profit even though the offers were never executed. This involves the plaintiff, the government, and the stock market as a whole as these fake orders had a big impact on prices and shifts. The issue of spoofing is wide in range and severity and can be hard to catch so some steps that can be taken to protect from it are the tracking of transaction/information of companies and their employees, alert systems for suspicious activities, and heavy penalties for spoofing.
This article shows just how serious and devastating ransomware attacks can be especially on mall to mid-level businesses. The article states that around 75% of small-mid size businesses would not be able to survive a ransomware attack. This effects a large portion of businesses, consumers, and the economy as a whole. It is scary to think about how these types of attacks could sink so many companies so some ways to protect against them are to use a firewall and antivirus software, avoid sharing personal information, scan and filter incoming information and sources.
This project is used to allow students to have the opportunity to learn about the various risks and threats that come with using technology. This was done by researching different types of articles that showcased real-world examples of cyber crimes and different threats. This can be easily understood and show just how much damage it can do regardless of the size, value, or name of the subject that is being attacked.
I learned many new things about cyber crime and cybersecurity. I learned that there are way more different types of risks, hacks, threats, and dangers relating to cyber security then the ones I knew before completing this project. I also learned various different steps that I can take to prevent myself from experiencing these issues and limit the damage if they still do occur. These will all be useful in the future as the world is becoming more and more digitalized so these issues will continue to increase in frequency.