Part 2 – Reflection The Internet’s Role in Cyberwarfare Affecting Corporate Privacy

Part 2 – Reflection The Internet’s Role in Cyberwarfare Affecting Corporate Privacy

 

The Internet is a dangerous place as it has turned into a battlefield where companies have to fight to protect their data from attackers. When it was first created, the Internet was meant to be a way for people to share information and communicate with each other. In recent times, it has become an incredibly complex digital landscape used by nation-states, criminal organizations, and hacktivists to engage in cyber espionage and warfare (Freet & Agrawal, 2017). Unfortunately, every company holds valuable assets and customer data, which makes them a valuable target for these hackers. One of the most common tactics attackers use is Advanced Persistent Threats (APTs). These threats can last weeks or even months without detection. The Internet is perfect for them because it allows attackers to stay under the radar while stealing critical information or interrupting operations.

Moreover, the Internet helps with the delivery of malicious payloads and command-and-control communications. Almost everyone has received sketchy emails that ask them if they want to receive a package from FedEx. Instead of a free headset, the attackers are sending malware to the device. On the other spectrum, it also makes it easier for less experienced hackers to get their hands on tools and tactics they most likely would not know where to find otherwise (Powers & Jablonski, 2015). Dark web marketplaces were created with one thing in mind: anonymity. Moreover, because of this, it is no surprise that they offer stolen data, malware, and hacking services as part of their product list. The Internet might make it easier for cybercriminals, but at the same time, it helps organizations gather intelligence on incoming threats and provides a space for information sharing. Notably,  while everyone is making advancements in all sorts of industries — so are threat actors.

References

Freet, D., & Agrawal, R. (2017). Cyber espionage. Encyclopedia of Big Data, 1-5.

O’Gorman, G., & McDonald, G. (2012). Ransomware: A growing menace. Arizona, AZ, USA: Symantec Corporation.

Powers, S. M., & Jablonski, M. (2015). The real cyber war: The political economy of internet freedom. University of Illinois Press.

 

Order a similar paper

Get the results you need