Cyber Threats to Organizations from Rival Organizations

This article discusses the threats and vulnerabilities researched over the internet related to information security in business operations. Sources of information for vulnerabilities and threats have been included with a clear description on which threats are prevalent and how they affect the business, organizations and governments.

Security threat is a malicious act that targets an organization’s systems or the whole organization to steal or corrupt data and disrupt the operations. Cyber security attack may be aimed by one organization to breach the systems of another organization with motivations of information theft, espionage, sabotage or financial gain, all with malicious intentions. Company data or its network may get exposed resulting in network or data breach. The threats have been classified into internal and external threats by Loch et. al (1992). The first category includes employee activities, administrative procedures, software problems and mechanical and electrical failures. The external threats come from hackers, competitors, viruses and natural disasters. The report by Rippleshot states that EVM are not fully capable of managing credit card fraud. The frauds are not curbed even though the liability has been managed. (Colwill, 2009) discusses important issues of internal threats related to information security in terms of cultural, social and economic factors. Some more attacks on information include drive-by download attack, phishing attack, botnet, distributed denial of service attack, ransomware, exploit kits, password attack, social engineering attack, man in the middle attack and advanced persistent threat attacks. These attacks have evolved to advanced level of sophistication, diversity and frequency and can bring an organization to a halt unless a dedicated security team is aware of them and ready to respond. The enterprise IT team must remain vigilant when it concerns protection of its data and networks. This requires thorough understanding of all possible threats and vulnerabilities that can cause undesirable situation.

Modern threats from fake identities have become harder to detect and stop. Threats render disruption in business continuity, while vulnerability causes exploitation of system by gaining unauthorized access to computer system. Vulnerabilities thus lead to data loss, destruction of sensitive data, malware installation, etc. harming the organization.

Credit Card fraud are getting more sophisticated through the chipped technology. I would like to delve deeper into the vulnerability of system which cause identity theft as mentioned by Kargie. Studying credit card fraud in detail shall provide a clear picture about how the attackers steal credit card information to make unauthorized purchases and use up the accounts stealthily.

Will surely research more on the CC Fraud and keep you posted!

Loch, Karen & Carr, Houston & Warkentin, Merrill. (1992). Threats to Information Systems: Today's Reality, Yesterday's Understanding. MIS Quarterly. 16. 173-186. 10.2307/249574.

References

Price, S., 2020, The Real Costs of Ecommerce Data Breaches, Espionage, and Security Mismanagement, Ecommerce Security, https://www.bigcommerce.com/blog/data-breaches/#the-costs-of-a-data-breach

Cloud Mask, 2020, Data Breaches: Threats and Consequences

Kragie, A., 2020, State of Card Fraud 2017, https://info.rippleshot.com/hubfs/StateOfCardFraud2017.pdf

Colwill, C., 2009, Human factors in information security: The insider threat – Who can you trust these days? Information Security Technical Report, Volume 14, Issue 4, Pages 186-196

Cassetto, O., 2019. 21 Top Cyber Security Threats and How Threat Intelligence Can Help. Published by: Exabeam, on 25th June.  https://www.exabeam.com/information-security/cyber-security-threat/

Comments

Popular posts from this blog

IoT: Device Vulnerability & Security Concerns in Wearable Devices

Research Outlet: Industry Academia Collaboration Program

Artificial Intelligence in Patient Health Monitoring System