The Continued emerging and current threats

The reading had a lot of captivating hypotheses and information regarding the continued emerging and current threats. All had significant points and posed several threats. Online banking, loss of data, and economic threats tend to exploit the company’s sites, and the services are quite severe and may cause a ton of harm.

However, I think various insurance companies and the government would likely pick up a tab and shut things before they even reach catastrophic levels. I would therefore go with physical threats to individuals, i.e., anything closely connected to the internet that causes bodily harm or even severe injuries.

For instance, the hacking systems would quickly shut down the engine of an aircraft, thus leading it to crash. Notably, the more devices connect to the internet, the worse it is likely to get. One of the Project 2020 stories talked about a citizen ‘Kinuko’s grandfather (ICSPA). If the sensors monitoring the body were connected to the internet, they could be easily hacked and shut down (Trend Micro, 2013). What about if everyone should be shut down using a pacemaker? Or even remotely hack a hospital and tamper with the life support machines? Murder, therefore, is a common serious offense that can be committed against humanity. The more we connect our bodies or systems to the net, these systems may lead to causing death, thus implicating so many risks (Trend Micro, 2013).

To combat the above ethical dilemma, it sets a society that does not allow these heinous acts to go far. Unfortunately, society requires us to go down this road regarding convenience and advancement. Companies must maintain the highest levels of advanced security and therefore must employ the brightest minds to protect these areas.

For instance, vehicles have been overlooked and left quite vulnerable. In one of the stories, ‘How hackable is your car? ‘Consult this chart’ the author indicates that the hackers of the likes of Chris Valasek and Charlie Miller assessed what they referred to as cars (Trend Micro, 2013). Various cyber-physical features, including automated parking, braking, and lane assist, would significantly assist in transforming a few spoofed digital commands into the actual out-of-control vehicle. In conclusion, these loopholes must be clearly reconsidered before a severe accident occurs and brings an entire population to attention later.

I think the question of who protects (and recovers) the losses, both in financial and data recovery, is crucial to moving forward. Many organizations are starting to consider protecting themselves with cybersecurity insurance.

Cybersecurity insurance or cyber liability insurance is a type of insurance that protects against losses caused by cyberattacks. Cyber insurers provide multiple types of coverage, including first-party, third-party, and cyber extortion (Abdullahi, 2022). During the recovery phase after a data breach, cybersecurity insurance assists in the financial recovery of data loss or costs associated with service interruption (Campbell, 2021).

In addition, some cyber insurance companies offer supplemental add-ons such as crime policies, which cover insider threats and workplace theft, and device covers to protect mobile electronic devices. Specific cyber liability protections include third-party indemnification, Data breach notification and containment, defense costs, network security audit coverage, and Remediation assistance.

Third-party indemnification is when a hacker steals network data or infects the organization’s network with malware. Implementing a consistent network security audit helps address software vulnerabilities that can be proactively patched with updates found during the audits to avoid hacker exploitation.

Data recovery in the event of data loss or corrupted files must be proactively prepared. The CISO and CIO should have a robust backup plan and possibly a secure cloud solution to ensure a recovery point and time are in place. Knowing what software and operating system need to be restored is critical and should be known by the key stakeholders reestablishing the system.

Also, having a backup plan that is not connected to the web is just as important. When using a standalone computing device, local backup conducted periodically will protect organizations from ransomware attacks that target systems and a company’s cloud storage (Insurance, 2018).

POST2: DH

1) The narrative that I feel is closest to what has begun to develop and poses the most significant threat is Citizen Kinuko. Of course, not all key features have surfaced yet. However, augmented reality with personalized content is growing in popularity. Technologically assisted living has already been implemented and used with pacemakers, defibrillators, and insulin pumps connected wirelessly and remotely, in which those using such devices are physically vulnerable to attacks.

Virtual property markets are already being utilized by marketing and property businesses (International, 2020). In addition, groups of individuals have begun to get personalized wireless implants; the transition has already started. As these areas advance and begin being globally utilized, personal data and content are always subject to vulnerabilities due to remote and wireless sensors. This is especially concerning for medical augmented assisted devices, as any disruption in function could mean life or death and unrestricted access to sensitive personal information. As with all technological devices, combating threats begins with strong security features embedded in devices during manufacturing (Hickman, 2019).

Next, I would audit the connected devices to human identity features and address weak credentials and establish plans that address identity management.

Alternately, augmented reality (AR) is a special technology that overlays computer-generated images (Gupta, 2017). Citizens are not the only ones utilizing this feature, as it has been used in the medical field to assist in procedures and surgeries.

Since AR channels can be hacked via AR servers with malicious content that alter imaging recognition, I would combat threats by using accurate filters for image recognition and limiting channel registration to decrease the number of attackers who can monitor the interactions between AR and its servers or browsers, and attempt to implement direct browser to server communication (Gupta, 2017). As AR technologies are improved and used more often, I suspect better security features will become available.

2) One of the most important questions that need answering is if we want global or local governance and security solutions. Based on our recent readings, global solutions seem to be forefront.

As it is, detecting, tracking, and prosecuting cybercrime is challenging due to remote access and transnational cyber threats. Some international cyber laws and treaties are in place, but they are subject to local state laws and sovereignty (Sandage et al., 2013).

This makes some investigations impossible. Therefore, security solutions should be focused on international cooperation and unification. Otherwise, we will end up with countries that are full of cyber criminals hiding behind their safe harbor.