The document discusses the main cybersecurity challenges faced in social computing. It identifies several key challenges: (1) big data breaches as more personal data is collected and stored; (2) the expansion of AI which could help detect cyberattacks but also poses risks; and (3) limited IT resources making it difficult for organizations to adequately monitor and secure expanding networks and devices. Additional challenges discussed include threats posed by the growing number of internet-connected devices and vulnerabilities in serverless applications. Real-world examples are provided to illustrate incidents and the potential damage from successful cyberattacks.
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Class activity 4
1. Sri Lanka Institute of Information
Technology
Master of Science (Information Management) Degree Program
Social Computing
Class Activity 04
W.M.J.H. Fernando
MS18901290
2. 2
List down and explain the main Cyber Security challenges faced in
Social Computing.
Explain the incidents with real world examples and good practices
to experience the minimum damage.
Computer network is a collection of computers which are connected. It can be using wires
or wireless. The internet is the global network connecting thousands of networks spanned
across the globe. Normally internet is opened to anyone who has a need to connect to it.
There are IT security is very essential.
Cybersecurity is the defense of computer systems from theft of or damage to their
hardware, software or electronic data, as well as from disruption or misdirection of the
services they provide [1].
The cyber security there are several challenges faced in social computing. The year 2017 saw
some of the biggest cyberthreats in recent history. There are millions of consumers and
thousands of businesses affected by everything from the WannaCry attack. It spread through
the computer network. Other challenges are, [2] [3]
• Big data, big breaches
With more and more data being collected, transmitted and used daily, compromising the
security of personal information is a growing business. Cyber criminals will continue to see
personally identifiable information as a source of value. With so many companies storing
data in the Cloud, watch for more ransomware attacks that will target Cloud breaches.
Example: [4]
3. 3
• AI Expansion
Robots might be able to help protect against incoming cyber-attack. Between 2016-2025,
businesses will apply almost $2.5 billion on AI to avoid cyberattacks.
Timing is the whole thing with malware and other malicious data manipulations. For
instance, it could fight a virus as it was downloading, also have a much better chance of
mitigating its forceful impact.
• Limited IT Resources
Another cybersecurity challenge schools face when protecting their networks from attacks
is a lack of IT resources. The existing cybersecurity skills gap means there is a lack of
obtainable professionals equipped to deal with the danger landscape schools aspect. It’s
terrible for the limited IT resources and personnel at schools to monitor every device and
request to the network. As even more devices require access to the network, carrying
applications with varying steps of security, and digital transformation changes infrastructure
and resources to the cloud, IT teams will need to join security solutions that provide network
visibility across spread environments combined with automation if they want to keep pace
with cybercriminals. [5]
4. 4
• IoT Threats
Most people nowadays using new technological devices. So that 84% of American
households, for case, have at least one smartphone. 80% have at least one desktop or laptop
computer. 68% have at least one tablet. And 39% have at least one streaming device.
The problem is that all that interconnectedness makes customers highly vulnerable to
cyberattacks. In detail, one study revealed that 70% of IoT devices have serious security
vulnerabilities. Exactly, insecure web interfaces and data transfers, insufficient
authentication methods, and a lack of customer security knowledge permission users open
to attacks. There is main reason is all there are devices are interconnected and at one time
access all these devices. In most of time risk happen password requirements, user
verification, time out sessions, two factor authentication and other sophisticated security
protocols.
5. 5
• Serverless Apps vulnerability
Serverless Apps vulnerability is another challenge in cybersecurity. There is customer
information is particularly at risk when users access others application off server or locally
on their device. Serverless apps are most common as web service and data processing tools.
Technology use only continue to raise, and with it, the attack surface that makes
organization vulnerable. To allow technology use and the invention it provides without do a
deal security, organization must be aware and plan to mitigate these cybersecurity
challenges.
References:
[1] “Computer security,” Wikipedia. 30-Aug-2018.
[2] “5 Cybersecurity Challenges and Trends: What to Expect in 2018.” [Online]. Available:
https://www.globalsign.com/en/blog/cybersecurity-trends-and-challenges-2018. [Accessed: 05-Sep-
2018].
[3] Dcode, “The Top Cybersecurity Challenges of 2018,” Dcode, 26-Jun-2018. .
[4] T. Armerding, “The 17 biggest data breaches of the 21st century,” CSO Online, 26-Jan-2018. [Online].
Available: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-
21st-century.html. [Accessed: 06-Sep-2018].
[5] S. Biddle, “Three of the Biggest Cybersecurity Challenges Facing the Education Sector,” Fortinet Blog, 13-
Dec-2017. [Online]. Available: https://www.fortinet.com/blog/business-and-technology/three-of-the-
biggest-cybersecurity-challenges-facing-the-education-sector.html. [Accessed: 06-Sep-2018].