Cyber Bullying and Cyber Security

This is FREE sample
This text is free, available online and used for guidance and inspiration. Need a 100% unique paper? Order a custom essay.
  • Any subject
  • Within the deadline
  • Without paying in advance
Get custom essay

A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks and other attack vectors.

The threats countered by cyber-security are of three types, Cybercrime includes single actor or groups targeting systems for financial gain or to cause disruption. Cyber-attack often involves politically motivated information gathering. Cyber terrorism is intended to undermine electronic systems to cause panic or fear. The term “cyber crime” is a misnomer. Cyber security threat is facilitated by, or involves the use of, electronic communications or information systems, including any electronic device, computer, or the internet. The term cyber security threat is a general term that covers crimes like phishing, credit card frauds, illegal downloading, industrial espionage,

Child pornography, cyber bullying, cyber stalking, cyber terrorism, creation or distribution of spam and so on. One of the biggest threats to cyber security is social hacking. Social hacking describes the act of attempting to manipulate outcomes of social behavior through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority.

This is done through pre-meditated research and planning to gain victim’s confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information. Social hacking is most commonly associated as a component of “social engineering”. Also, Cyber security threats of higher-order, For example, ‘ransom ware’ or ‘AI malware’ were considered to be the most severe threats. But over time, we have become cyber-mature, and the understanding of what a top threat has changed. A threat that is crucial to one industry may not be of the same significance to another. Many well-known organizations suffered from these cyber security disasters and compromised data of millions of users.

These threats are, AI-Generated phishing emails, Human-generated phishing attacks involve digital messages to trick people into clicking on a malicious link that installs malware or exposes sensitive data. AI-generated phishing emails are way more dangerous than the ones generated by humans. Crypto Jacking is a form of cyber attack in which the attacker hijacks third party computer, tablet, mobile phone, or connected home device to mine crypto currency. Attacking from the computing cloud, such attacks are major threats to the companies that host other company’s data on their servers or manage clients IT services remotely.

By sneaking into the system of these companies, hackers can also infiltrate the clients too. Mobile malware is malicious software specifically designed to target mobile devices, such as smart phones and tablets, with the goal of gaining access to private data. Hacking AI defense with AI tools, this can be carried out using generative adversarial networks, which involves two neutral networks contesting each other to discover the AI algorithms each is using. If the hackers discover the algorithm, they can easily develop a model to bypass it. Hacking block chain smart contracts, these are software programs running on top of block chain which automatically processes some form of digital asset exchange if the pre-defined rules meet.
Therefore, to overcome such cyber threats the cyber security operation management has been developed.

The parliament of India launched the first Cyber Law Act through information technology act on 17 October 2000. IT ACT 2000’s prime purpose was to provide legal recognition to electronic commerce and to provide the legal infrastructure for e-commerce in India. Cyber law is a generic term which refers to all the legal and regulatory aspects of internet and the World Wide Web. The growth of electronic commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of electronic commerce. These legal infrastructures come within the domain of cyber law.

What are the solutions to overcome cyber threats? The answer to this question is to install, use and regularly update antivirus and antispyware software on every computer used in your business, use a firewall for your internet connection, make backup copies of important business data and information, regularly change passwords, limit employee access to data and information, limit authority to install software, require individual user accounts for each employee, etc. These steps also help in prevention of plagiarism and secure the users information.

The Future of Cyber security includes Increased interconnection might end up exposing our personal and business lives, Big data will get more vulnerable, Improved intrusion detection, Secure code developers will become more relevant, Cognitive security will gain more popularity, Cyber-attacks will get more and more sophisticated.But, there are also few disadvantages of cyber security, like, it will be costly for average users, firewall can be difficult to configure, need to keep updating new software in order to secure the updated information, makes the system slower than before and many more.

With the scale of the cyber threat set to continue to rise, the International Data Corporation predicts that worldwide spending on cyber-security solutions will reach a massive $133.7 billion by 2022. The future prospects of CTIA (Certified Threat Intelligence Analyst) is a method-driven program that uses a holistic approach, covering concepts from planning to building an effective threat report, when used properly, can secure organizations from future threats. The program addresses all the stages involved in the threat intelligence life cycle.

Cyber security Threats and Trends for 2020 re A Severe Shortage of Cyber security Professionals, Third parties such as vendors and contractors pose a huge risk to corporations, the majority of which have no secure system or dedicated team in place to manage these third-party employees, Connected Cars and Semi-Autonomous Vehicles, A connected car utilizes onboard sensors to optimize its own operation and the comfort of passengers. This is typically done through embedded, tethered or Smartphone integration. As technology evolves, the connected car is becoming more and more prevalent.

For hackers, this evolution in automobile manufacturing and design means yet another opportunity to exploit vulnerabilities in insecure systems and steal sensitive data or harm drivers. IOT Attacks, the Internet of Things is becoming more ubiquitous by the day. The number of devices connected to the IOT is expected to reach 75 billion by 2025. It includes laptops and tablets, of course, but also routers, webcams, household appliances, smart watches, medical devices, manufacturing equipment, automobiles and even home security systems.


Cite this paper

Cyber Bullying and Cyber Security. (2020, Sep 09). Retrieved from https://samploon.com/cyber-bullying-and-cyber-security/



What is the definition of terms of cyberbullying?
Cyberbullying refers to the use of electronic communication to harass or intimidate someone, often with the intention of causing harm. This can include sending threatening messages, spreading rumors, or posting embarrassing photos or videos online.
Which country has the highest rate of cyberbullying?
The United States has the highest rate of cyberbullying.
We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Peter is on the line!

Don't settle for a cookie-cutter essay. Receive a tailored piece that meets your specific needs and requirements.

Check it out