SlideShare a Scribd company logo
Sri Lanka Institute of Information
Technology
Master of Science (Information Management) Degree Program
Social Computing
Class Activity 04
W.M.J.H. Fernando
MS18901290
2
List down and explain the main Cyber Security challenges faced in
Social Computing.
Explain the incidents with real world examples and good practices
to experience the minimum damage.
Computer network is a collection of computers which are connected. It can be using wires
or wireless. The internet is the global network connecting thousands of networks spanned
across the globe. Normally internet is opened to anyone who has a need to connect to it.
There are IT security is very essential.
Cybersecurity is the defense of computer systems from theft of or damage to their
hardware, software or electronic data, as well as from disruption or misdirection of the
services they provide [1].
The cyber security there are several challenges faced in social computing. The year 2017 saw
some of the biggest cyberthreats in recent history. There are millions of consumers and
thousands of businesses affected by everything from the WannaCry attack. It spread through
the computer network. Other challenges are, [2] [3]
• Big data, big breaches
With more and more data being collected, transmitted and used daily, compromising the
security of personal information is a growing business. Cyber criminals will continue to see
personally identifiable information as a source of value. With so many companies storing
data in the Cloud, watch for more ransomware attacks that will target Cloud breaches.
Example: [4]
3
• AI Expansion
Robots might be able to help protect against incoming cyber-attack. Between 2016-2025,
businesses will apply almost $2.5 billion on AI to avoid cyberattacks.
Timing is the whole thing with malware and other malicious data manipulations. For
instance, it could fight a virus as it was downloading, also have a much better chance of
mitigating its forceful impact.
• Limited IT Resources
Another cybersecurity challenge schools face when protecting their networks from attacks
is a lack of IT resources. The existing cybersecurity skills gap means there is a lack of
obtainable professionals equipped to deal with the danger landscape schools aspect. It’s
terrible for the limited IT resources and personnel at schools to monitor every device and
request to the network. As even more devices require access to the network, carrying
applications with varying steps of security, and digital transformation changes infrastructure
and resources to the cloud, IT teams will need to join security solutions that provide network
visibility across spread environments combined with automation if they want to keep pace
with cybercriminals. [5]
4
• IoT Threats
Most people nowadays using new technological devices. So that 84% of American
households, for case, have at least one smartphone. 80% have at least one desktop or laptop
computer. 68% have at least one tablet. And 39% have at least one streaming device.
The problem is that all that interconnectedness makes customers highly vulnerable to
cyberattacks. In detail, one study revealed that 70% of IoT devices have serious security
vulnerabilities. Exactly, insecure web interfaces and data transfers, insufficient
authentication methods, and a lack of customer security knowledge permission users open
to attacks. There is main reason is all there are devices are interconnected and at one time
access all these devices. In most of time risk happen password requirements, user
verification, time out sessions, two factor authentication and other sophisticated security
protocols.
5
• Serverless Apps vulnerability
Serverless Apps vulnerability is another challenge in cybersecurity. There is customer
information is particularly at risk when users access others application off server or locally
on their device. Serverless apps are most common as web service and data processing tools.
Technology use only continue to raise, and with it, the attack surface that makes
organization vulnerable. To allow technology use and the invention it provides without do a
deal security, organization must be aware and plan to mitigate these cybersecurity
challenges.
References:
[1] “Computer security,” Wikipedia. 30-Aug-2018.
[2] “5 Cybersecurity Challenges and Trends: What to Expect in 2018.” [Online]. Available:
https://www.globalsign.com/en/blog/cybersecurity-trends-and-challenges-2018. [Accessed: 05-Sep-
2018].
[3] Dcode, “The Top Cybersecurity Challenges of 2018,” Dcode, 26-Jun-2018. .
[4] T. Armerding, “The 17 biggest data breaches of the 21st century,” CSO Online, 26-Jan-2018. [Online].
Available: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-
21st-century.html. [Accessed: 06-Sep-2018].
[5] S. Biddle, “Three of the Biggest Cybersecurity Challenges Facing the Education Sector,” Fortinet Blog, 13-
Dec-2017. [Online]. Available: https://www.fortinet.com/blog/business-and-technology/three-of-the-
biggest-cybersecurity-challenges-facing-the-education-sector.html. [Accessed: 06-Sep-2018].

More Related Content

PDF
PPTX
Information & Cyber Security Risk
PPTX
Cyber Security in the Manufacturing Industry: New challenges in the informati...
PDF
Top 8 Cybersecurity Trends 2020
PDF
Cyber security-in-india-present-status
PPTX
Cyber Security
PDF
ACS Talk (Melbourne) - The future of security
Information & Cyber Security Risk
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Top 8 Cybersecurity Trends 2020
Cyber security-in-india-present-status
Cyber Security
ACS Talk (Melbourne) - The future of security

What's hot (20)

PDF
Top Cybersecurity Trends of 2021
PDF
Toward Continuous Cybersecurity with Network Automation
PPTX
Cyber security and Homeland security
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
PPTX
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPTX
Global Cybersecurity Market (2017 - 2022)
PDF
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
PPTX
Career in cyber security
PDF
Combating Cyber Security Using Artificial Intelligence
PDF
Cybersecurity in the Age of Mobility
PPTX
Cybersecurity in the Era of IoT
PPTX
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
PDF
Deep Learning for Cybersecurity Innovation Insights from Patents
PDF
Cyber Security Intelligence
PDF
Safeguarding the Internet of Things
PDF
The future of cyber security
PDF
Cybersecurity Skills in Industry 4.0
PPSX
The Ultimate Guide To Cyber Security Certifications
DOCX
Chapter 8 securing information systems MIS
Top Cybersecurity Trends of 2021
Toward Continuous Cybersecurity with Network Automation
Cyber security and Homeland security
Whitepaper Avira about Artificial Intelligence to cyber security
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Global Cybersecurity Market (2017 - 2022)
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
Career in cyber security
Combating Cyber Security Using Artificial Intelligence
Cybersecurity in the Age of Mobility
Cybersecurity in the Era of IoT
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
Deep Learning for Cybersecurity Innovation Insights from Patents
Cyber Security Intelligence
Safeguarding the Internet of Things
The future of cyber security
Cybersecurity Skills in Industry 4.0
The Ultimate Guide To Cyber Security Certifications
Chapter 8 securing information systems MIS
Ad

Similar to Class activity 4 (20)

PPTX
ppt on cybersecurity and why its necessary
PDF
Cyber Security Challenges on Latest Technologies
PDF
How to avoid cyber security attacks in 2024 - CyberHive.pdf
PPTX
cybersecurity-ppt.pptx btech unit unknown aktu
PPTX
CyberSecurity_Presefxgdrfffntation_final.pptx
PDF
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
PDF
Cybersecurity | Risk. Impact. Innovations.
PPTX
hgfhvgggggggggggggggggggggggpresent.pptx
PDF
Pbl ppt on cybersecurity.pdf
DOCX
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
PDF
C018131821
PDF
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
PPTX
Cyber Security: Understanding Emerging Threats and Defense Strategies
PPTX
Cyber Security – Emerging Threats and Countermeasures
PPTX
Emerging threats in cyber security: anticipating and mitigating future risks....
PDF
McAfee Labs 2017 Threats Predictions
PDF
IRJET- Cybersecurity: The Agenda for the Decade
PDF
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
PPTX
Cyber Security PPT.pptx
ppt on cybersecurity and why its necessary
Cyber Security Challenges on Latest Technologies
How to avoid cyber security attacks in 2024 - CyberHive.pdf
cybersecurity-ppt.pptx btech unit unknown aktu
CyberSecurity_Presefxgdrfffntation_final.pptx
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
Cybersecurity | Risk. Impact. Innovations.
hgfhvgggggggggggggggggggggggpresent.pptx
Pbl ppt on cybersecurity.pdf
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
C018131821
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
Cyber Security: Understanding Emerging Threats and Defense Strategies
Cyber Security – Emerging Threats and Countermeasures
Emerging threats in cyber security: anticipating and mitigating future risks....
McAfee Labs 2017 Threats Predictions
IRJET- Cybersecurity: The Agenda for the Decade
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
Cyber Security PPT.pptx
Ad

More from Jeewanthi Fernando (20)

PDF
Assingment 5 - ENSA
PDF
Assingment 4 - DDos
DOCX
Assingment 3 - Bug bounty
PDF
Assingment 2 - Law
PDF
Assingment 1 - Google haker
PPTX
Ob group presentation
PDF
OB group assignment
PPTX
PPTX
Assignment - Maliban
PDF
Assignment 1
PPTX
BPM presentation
PDF
Business Process Management Doc
PPTX
Group assingment
PDF
Class activity 5
PDF
Class activity 3
PPTX
Professional networking
PDF
Assignment 1
PDF
PDF
ALSS Assingment 1
Assingment 5 - ENSA
Assingment 4 - DDos
Assingment 3 - Bug bounty
Assingment 2 - Law
Assingment 1 - Google haker
Ob group presentation
OB group assignment
Assignment - Maliban
Assignment 1
BPM presentation
Business Process Management Doc
Group assingment
Class activity 5
Class activity 3
Professional networking
Assignment 1
ALSS Assingment 1

Recently uploaded (20)

PPTX
master seminar digital applications in india
PDF
Pre independence Education in Inndia.pdf
PDF
Business Ethics Teaching Materials for college
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
RMMM.pdf make it easy to upload and study
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Insiders guide to clinical Medicine.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
master seminar digital applications in india
Pre independence Education in Inndia.pdf
Business Ethics Teaching Materials for college
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
RMMM.pdf make it easy to upload and study
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Renaissance Architecture: A Journey from Faith to Humanism
102 student loan defaulters named and shamed – Is someone you know on the list?
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Week 4 Term 3 Study Techniques revisited.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
01-Introduction-to-Information-Management.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
2.FourierTransform-ShortQuestionswithAnswers.pdf
O7-L3 Supply Chain Operations - ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra
Insiders guide to clinical Medicine.pdf
VCE English Exam - Section C Student Revision Booklet

Class activity 4

  • 1. Sri Lanka Institute of Information Technology Master of Science (Information Management) Degree Program Social Computing Class Activity 04 W.M.J.H. Fernando MS18901290
  • 2. 2 List down and explain the main Cyber Security challenges faced in Social Computing. Explain the incidents with real world examples and good practices to experience the minimum damage. Computer network is a collection of computers which are connected. It can be using wires or wireless. The internet is the global network connecting thousands of networks spanned across the globe. Normally internet is opened to anyone who has a need to connect to it. There are IT security is very essential. Cybersecurity is the defense of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide [1]. The cyber security there are several challenges faced in social computing. The year 2017 saw some of the biggest cyberthreats in recent history. There are millions of consumers and thousands of businesses affected by everything from the WannaCry attack. It spread through the computer network. Other challenges are, [2] [3] • Big data, big breaches With more and more data being collected, transmitted and used daily, compromising the security of personal information is a growing business. Cyber criminals will continue to see personally identifiable information as a source of value. With so many companies storing data in the Cloud, watch for more ransomware attacks that will target Cloud breaches. Example: [4]
  • 3. 3 • AI Expansion Robots might be able to help protect against incoming cyber-attack. Between 2016-2025, businesses will apply almost $2.5 billion on AI to avoid cyberattacks. Timing is the whole thing with malware and other malicious data manipulations. For instance, it could fight a virus as it was downloading, also have a much better chance of mitigating its forceful impact. • Limited IT Resources Another cybersecurity challenge schools face when protecting their networks from attacks is a lack of IT resources. The existing cybersecurity skills gap means there is a lack of obtainable professionals equipped to deal with the danger landscape schools aspect. It’s terrible for the limited IT resources and personnel at schools to monitor every device and request to the network. As even more devices require access to the network, carrying applications with varying steps of security, and digital transformation changes infrastructure and resources to the cloud, IT teams will need to join security solutions that provide network visibility across spread environments combined with automation if they want to keep pace with cybercriminals. [5]
  • 4. 4 • IoT Threats Most people nowadays using new technological devices. So that 84% of American households, for case, have at least one smartphone. 80% have at least one desktop or laptop computer. 68% have at least one tablet. And 39% have at least one streaming device. The problem is that all that interconnectedness makes customers highly vulnerable to cyberattacks. In detail, one study revealed that 70% of IoT devices have serious security vulnerabilities. Exactly, insecure web interfaces and data transfers, insufficient authentication methods, and a lack of customer security knowledge permission users open to attacks. There is main reason is all there are devices are interconnected and at one time access all these devices. In most of time risk happen password requirements, user verification, time out sessions, two factor authentication and other sophisticated security protocols.
  • 5. 5 • Serverless Apps vulnerability Serverless Apps vulnerability is another challenge in cybersecurity. There is customer information is particularly at risk when users access others application off server or locally on their device. Serverless apps are most common as web service and data processing tools. Technology use only continue to raise, and with it, the attack surface that makes organization vulnerable. To allow technology use and the invention it provides without do a deal security, organization must be aware and plan to mitigate these cybersecurity challenges. References: [1] “Computer security,” Wikipedia. 30-Aug-2018. [2] “5 Cybersecurity Challenges and Trends: What to Expect in 2018.” [Online]. Available: https://www.globalsign.com/en/blog/cybersecurity-trends-and-challenges-2018. [Accessed: 05-Sep- 2018]. [3] Dcode, “The Top Cybersecurity Challenges of 2018,” Dcode, 26-Jun-2018. . [4] T. Armerding, “The 17 biggest data breaches of the 21st century,” CSO Online, 26-Jan-2018. [Online]. Available: https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the- 21st-century.html. [Accessed: 06-Sep-2018]. [5] S. Biddle, “Three of the Biggest Cybersecurity Challenges Facing the Education Sector,” Fortinet Blog, 13- Dec-2017. [Online]. Available: https://www.fortinet.com/blog/business-and-technology/three-of-the- biggest-cybersecurity-challenges-facing-the-education-sector.html. [Accessed: 06-Sep-2018].