Personal tools
You are here: Home Research Trends & Opportunities New Media and New Digital Economy Cyberterrorism, Cyberwarfare and Future Cybersecurity

Cyberterrorism, Cyberwarfare and Future Cybersecurity

(Bay Area/San Francisco, California - Jeff M. Wang)



- Future Cybersecurity

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. 

For example, by 2025, it is estimated that there will be more than to 21 billion Internet of Things (IoT) devices. Cybercriminals will continue to use IoT devices to facilitate DDoS attacks. In 2016, the world was introduced to the first “Internet of Things” malware - a strain of malicious software that can infect connected devices such as DVRs, security cameras, and more. The malware accessed the devices using default password and usernames. The malware turned the affected devices into a botnet to facilitate a Distributed Denial of Service (DDoS) attack, which aims to overwhelm websites with internet traffic. The attack ended up flooding one of the largest website hosting companies in the world, bringing a variety of major, well-known websites and services to a halt for hours. 

IoT security focuses on protecting your Internet-enabled devices that connect to each other on wireless networks. IoT security is the safety component tied to the Internet of Things, and it strives to protect IoT devices and networks against cybercrime.


- The Threats Facing The Industry

Cybersecurity is a hot topic for organizations across every industry. Securing networks, hardening systems, and protecting data from cyber threats has become more important than ever, as cyber incidents are on the rise. 

Every other day we read news related to cybersecurity threats like ransomware, phishing, or IoT-based attacks. Recently, it comes with a whole new level of cybersecurity threats that businesses need to be aware of. In fact, organizations will face cyber threats under three key themes:

  • Disruption: Over-dependence on fragile connectivity will increase the risk of premeditated internet outages that compromise business operations. Cybercriminals will use ransomware to hijack the Internet of Things.
  • Distortion: Spread of misinformation by bots and automated sources will cause compromise of trust in the integrity of information.
  • Deterioration: Rapid advances in smart technologies and conflicting demands posed by evolving national security will negatively impact an enterprise’s ability to control information.


- Emerging Trends in Cybersecurity

Cybersecurity trends - a result of technological developments, cultural shifts and attackers’ innovations - build upon the past. The risk and severity of cyber-attacks have clearly grown over the past few years. In fact, since the year 2018, mankind has witnessed the most horrific cases of cybercrimes related to massive data breaches, flaws in microchips, cryptojacking, and many others. 

Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services.  

It goes without saying that the advancement of technology and the wide use of digital media is making attackers smarter by the day. Further, these cybercriminals take advantage of individuals and firms who pay less heed to cybersecurity. They target everything from a newly-launched blog to an established online store to gain access to sensitive information.r daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. 



[More to come ...]



Document Actions