CYBERSECURITY




What Does it Do?

What is Cybersecurity? The world has become more increasingly dependent on technology than ever previously and as an outcome, more and more digital data is being created every day. Users, People and Government are increasingly relying on and storing massive amounts of data on computers/devices and transmitting it regularly across networks. Cybersecurity relates to the security threats and vulnerabilities that can occur when connected to outside sources (i.e the internet, networks, or the cloud.) and the related technologies and tools that can protect data from these threats. Cybersecurity must ensure that the Integrity, Confidentiality and Availability of data never becomes compromised. Cybersecurity involves an ever-changing set of risk management procedures, tools, training and best practices that are used to protect networks, devices and data from unwanted attacks. When exploited, these threats can have devastating outcomes for the health of an organisation or person (Forcepoint, n.d.).

Cybersecurity attacks can come in various forms. I will now summarise some of these threats:


What is the Likely Impact?
Cybersecurity threats are expected to rise over the next few years, the International Data Corporation suggests that spending across the globe on cybersecurity solutions could rise to $133.7 Billion by 2022 (Kaspersky, n.d.). The potential of data being stolen can have devastating consequences. In the year 2019, The FBI suggested a reported loss of over 3.5 Billion dollars over 467,361 complaints of breaches of cybercrime (FBI, 2020). One thing worth noting too is that cybersecurity threats are rising year by year as evidenced by a 25% increase in ransomware cases from 2018 to 2019 (Parker, 2020).

As with the growing demand for technology, no one is completely safe from cybercrime, experts predict that it will continue to affect people more and more. Currently, people use a multitude of devices to check their bank balances, surf the internet, use email, and connect with others. We as a society are getting more and more reliant on technology, therefore we are also increasingly more and more at risk of exposure to cybercrime (Giles, 2016). With the COVID-19 pandemic occurring at the start of 2020, a lot of people had the option of working from home through the use of technology. Studies suggest that one in six Australians were the victims of cybercrime just in this period alone (Williams, 2020).

Cybersecurity as a field of employment is expected to rise continuously over the next decade. Worldwide, the cybersecurity market amassed a worth of USD 74 billion in 2015 and they believe it will more than double its worth to USD 172 billion by 2020 (Institute of Data, 2019). Australia in 2019 was short of around 2,300 cybersecurity workers and that figure is expected to rise to 17,600 by 2026 (Institute of Data, 2019). According to a report from Cisco from 2015, cybersecurity skills are in demand with the field being in short supply. In 2015 there were a million jobs in demand for cybersecurity and that figure is expected to rise with the demand for skills (Cisco, 2015).

How Will This Affect Us?

We use technology for a plethora of things today. There has been a great change in how we conduct things like banking in the last decade or so. There has been a growing demand to move services like this online to make people's life easier. Previously you would have to physically go into the bank to do things like transfer money, open an account or apply for a loan but now a lot of these services have been transferred online (Roy Morgan 2013). Banking is not the only service to move online, along with things like just buying your groceries has shifted to the online world. So we need these services to be secure as possible, as a lot of sensitive information can be processed through examples like this.

No one is completely safe from cybersecurity when it comes to individuals, businesses, national, or even worldwide. Identity theft can be a devastating crime to happen to someone. A hacker could get someone’s details and start to fraudulently pose as the victim to access things like bank accounts or other benefits (ACSC, 2020). An example of cybercrime could be if a nation interfered in another nation’s election or democracy (Hoffman 2020). In 2019, the Australian government had a case of malicious activity being conducted on the Australian parliament computer networks (Brangwin, Portillo-Castro, n.d.).

In the future, we will need to take the threat of cybersecurity very seriously as it can have extremely devastating effects on our lives. People are increasingly sharing information about their daily lives as well as giving away their data and it could be quite easy for a hacker to exploit this (Chandler, 2019). I have always tried to keep my life away from the digital world, keeping away from services such as social media. However, the threat of cyber related crime is always out there and is a force that may be here to stay.

Reference List

ACSC (Australian Cyber Security Centre), 2020, ‘Identity Theft’, viewed 6th January 2021, https://www.cyber.gov.au/acsc/view-all-content/threats/identity-theft

Brangwin N, Portillo-Castro H, n.d., ‘Cybersecurity’, viewed 6th January, https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/BriefingBook46p/Cybersecurity

Chandler S, 2019, ‘We’re giving away more personal data than ever, despite growing risks’, blog post, 24th February 2019, viewed 6th January 2021, https://venturebeat.com/2019/02/24/were-giving-away-more-personal-data-than-ever-despite-growing-risks/

Cisco, 2015, ‘Mitigating the Cybersecurity Skills Shortage’, company report, Cisco, viewed 6th January 2021, https://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-talent.pdf

FBI, 2020, ‘FBI Releases the Internet Crime Complaint Center 2019 Internet Crime Report’ Federal Bureau of Investigation, viewed 4th January 2021, https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint-center-2019-internet-crime-report

Forcepoint, n.d., ‘What is Cybersecurity?’, Forcepoint, viewed 2nd January 2021, https://www.forcepoint.com/cyber-edu/cybersecurity

Fruhlinger J, 2020, ‘Ransomware explained: How it works and how to remove it’, blog post, 19th June 2020, viewed 2nd January 2021, https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how-to-remove-it.html

Giles J, 2016, ‘Cybercrime affects everyone’, blog post, 19th January 2016, viewed 6th January 2021, https://www.michalsons.com/blog/cyber-crime-and-cyber-security-affects-everyone/18167

Hoffman B, 2020, ‘Election Protection: How Cyber Criminals Could Steal Your Vote’, Thycotic, viewed 6th January 2021, https://thycotic.com/company/blog/2020/11/03/election-protection-how-cyber-criminals-could-steal-your-vote/

Institute of Data, 2019, ‘Is cyber security in demand in Australia?’, Institute of Data, viewed 6th January 2021, https://www.institutedata.com/blog/is-cyber-security-in-demand-in-australia/

Kaspersky, n.d. ‘Learn about Malware and how to protect all your devices against it’, Kaspersky, viewed 2nd January 2021, https://www.kaspersky.com.au/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it

Parker J, 2020, ‘What is the future of cybersecurity?’, TechRadar, viewed 6th January 2021, https://www.techradar.com/au/news/what-is-the-future-of-cybersecurity

Phishing.org, n.d. ‘What is Phishing?’, Phishing.org, viewed 3rd January 2021, https://www.phishing.org/what-is-phishing

Roy Morgan, 2013, ‘The Rise of Internet Banking’, Roy Morgan, viewed 6th January 2021, http://www.roymorgan.com/findings/5203-internet-banking-on-rise-201309200624

Webroot, n.d. ‘What is Social Engineering?’, Webroot, Viewed 2nd January 2021, https://www.webroot.com/au/en/resources/tips-articles/what-is-social-engineering

Williams S, 2020, ‘Australian cyber crime on the rise during COVID lockdown’ blog post, 14th August 2020, viewed 6th January 2021, https://itbrief.com.au/story/australian-cyber-crime-on-the-rise-during-covid-lockdown