Cyber Vulnerability
Recent studies depict that there are emerging threats in the cybersecurity system. These vulnerabilities are caused as a result of the exponential growth or increased internet interconnections. The cyber-attacks incidences usually have grievous repercussions and are also disastrous. The attackers involved in this criminal activity can be grouped into three categories: online criminals, ‘hactkivists” like the Anonymous, who majorly engages in the undesirable act for the protest, and the nation states attacks. The online criminals and the “hacktivists’ actions are normally motivated by the desire for money, while the nation-state may engage in the act to harm its citizens (Hypponen, 2011).
The measures that can be utilized in enhancing the nation’s cybersecurity include restricting access to wireless networks by ensuring that only authorized users are allowed by relevant Information Technology agencies. Secondly, the government should implement or enact a security assessment plan that seeks to identify cyber threats, vulnerabilities, and threats. The country may also acquire a cyber-insurance as a bid to safeguard potential costly outcomes derived from cyber-attacks. Finally, the nation’s IT agencies should adopt a purpose-made policy on cybersecurity that may address several needs, such as raising awareness of potential risks and offering insight into the potential vulnerabilities and their solutions.
The steps I have taken to ensure protection against cyber-attacks include using strong passwords and changing them regularly through the use of the password management application. Secondly, I make the use of full-service internet security suites such as Norton Security for protection against emerging and existing malware. Thirdly, I tend to update myself on major security breaches as a way of keeping me in the know of the data the cyber attackers accessed and make a change on my password. Lastly, I have strengthened my home network by encrypting my VPN and password.
References
Hypponen, M. (Director). (2011). Three types of online attack [Motion Picture]. https://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack/discussion?language=en