Unit 5 Assignment
docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
111T
Subject
Mechanical_engineering
Date
Jun 18, 2024
Type
docx
Pages
3
Uploaded by badams2114
Email on Trends in My Industry
From: Me
To: Ms. Smith
Date: 21 February 2023
Dear Ms. Smith,
You tasked me with researching the current and emerging trends in our industry. I have completed this task and identified the top three cybersecurity trends: ransomware, botnets, and zero-day attacks.
Ransomware has become a pivotal issue in the cybersecurity landscape, evolving significantly since its inception in the late 1980s. The use of cryptocurrency has exacerbated its impact, making it a primary component of numerous recent cyber incidents. The potential consequences, ranging from financial loss due to ransom payments to complete data compromise, make ransomware a critical concern for organizations worldwide.
Botnets have also emerged as a prominent cybersecurity trend, capable of facilitating distributed denial of service (DDoS) attacks, phishing schemes, and spam campaigns. Over the past decade, botnets have grown into a persistent threat, highlighted by their role in large-scale attacks like the
WannaCry ransomware incident of 2017. Their scalability and ability to lie dormant until activated make botnets a versatile tool for cyber attackers.
Zero-day attacks represent another significant trend, exploiting previously unknown vulnerabilities in software that vendors have not yet patched. These attacks pose a severe risk, as they lack readily available defenses and require mitigation strategies to minimize their impact. Often leveraged by advanced persistent threats (APTs) and nation-state adversaries, zero-day attacks remain a critical challenge for organizations.
In conclusion, it is crucial to acknowledge the multitude of emerging threats in cybersecurity. While defending against all threats may be impractical, staying informed about current trends enables proactive readiness and effective response strategies. By maintaining vigilance and adapting to evolving threats, we can enhance our resilience against potential cyber threats.
Please find my references below. Should you have any questions, I am available to provide further clarification.
Thank you for your attention to this matter.
Me
1
References
Calder, A. (2021). The ransomware threat landscape: Prepare for, recognise and survive ransomware attacks
. IT Governance Publishing. Retrieved February 11, 2023, from https://library-books24x7-com.ezproxy.umgc.edu/toc.aspx?
bookid=155363
.
Shinan, K., Alsubhi, K., Alzahrani, A., Ashraf, M. U., & Alcantud, J. C. R. (2021). Machine Learning-Based Botnet Detection in Software-Defined Network: A Systematic Review. Symmetry (20738994)
, 13
(5), 866. https://doi-
org.ezproxy.umgc.edu/10.3390/sym13050866
Tari Schreider. (2020). Cybersecurity Law, Standards and Regulations, 2nd Edition: Vol.
2nd ed
. Rothstein Publishing.
References
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help