ITM 5600 WEEK 5 ARTICLE SRIRAM

docx

School

University of the Fraser Valley *

*We aren’t endorsed by this school

Course

211

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by jacklinecheruto

Report
ITM 5600 – Current Event Article Template Paste URL to article: https://www.researchgate.net/publication/369186216_A_Comprehensive_Review_of_Cybe r_Security_Vulnerabilities_Threats_Attacks_and_Solutions Title of Article: A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions Author: Ömer Aslan, Merve Ozkan Okay, Abdullah Asım Yılmaz, Date of Publica tion: March 2023 Brief summa ry of article: (no more than 150 words) In this article, the growing importance of cybersecurity in the digital age is discussed, with a focus on the difficulties presented by online threats and the changing nature of cyberattacks. An increased dependency on digital settings is the result of the internet's rapid usage growth, which was sped further by the COVID-19 pandemic. Therefore, classic crimes have moved into the digital sphere, where new security issues have been raised by emerging technologies like cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrency. The article lists several different kinds of cyberattacks, such as malware, distributed denial of service (DDoS), phishing, man-in-the-middle attacks, password attacks, remote exploits, and man-in-the-middle attacks. It underlines that more sophisticated cyber threats require more than what can be handled by standard security measures like firewalls, intrusion detection systems, and antivirus software. Origina l comme ntary about article (50- 250 words): This in-depth piece emphasizes how crucial cybersecurity is in our increasingly connected digital world. It sheds light on the constantly changing nature of cyber dangers and the difficulties they present for people, companies, and countries. We must change the way we think about security because of the COVID-19 epidemic, rapid internet usage growth, and the acceleration of traditional crimes into the digital sphere. The concise description of the complex nature of cyber dangers is what stands out. It explores the behavioral and procedural components of attacks in addition to their technical aspects. Even if innovations in technology like block chain and AI, particularly machine learning, provide hopeful solutions, they are not without drawbacks, such as exposure to biases and evasion tactics. The main takeaway from the article is the demand for cooperation among many parties. Cybersecurity is a problem that cannot be solved by one organization acting alone. It requires a coordinated effort from people, groups, authorities, and the tech sector. The importance of user education and training cannot be overstated. Even the most sophisticated security measures are only as effective as the people utilizing them. Suggested list of publications to use as sources: You may deviate from this list, but you need to make sure you are referencing a quality reputable source.
Reuters CSO Forbes Al Jazeera New York Times Washington Post Bleeping Computer The Wall Street Journal ZD Net The Register Ars Technica The Guardian The Hacker News The Economist ISACA Journal Security Magazine Harvard Business Review Wired The Record TechCrunch CNN CNET Security Week Info Security Magazine BBC Associated Press Bloomberg Krebs on Security Vice LA Times Axios The Verge Cyber Scoop National Public Radio Politico Arxiv.org Information Security Professional Possible topics to discuss in original commentary: Who is the author and why are they credible on this topic? Or why are they not credible on this topic? How old is the article and why is it still considered relevant? What is the relationship of this content to the class material? Why was this article chosen? Can this subject be related to your personal experience somehow? Is there something that surprises you or is doubtful about what was said in the article?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help