Identify 3 to 5 threats to the cyber domain, including one from each of the 3 layers. Consider threats discussed in this course, your reading, or from recent events.
Discuss the challenges of securing against each threat you identified. Why is it difficult? For example, phishing is a challenge of the persona layer. It is challenging to secure against phishing because phishing emails can appear to be authentic and urgent, leveraging people’s emotions.
Explain what you imagine are future challenges to securing the cyber domain, including those you discussed. Will we ever eliminate these challenges? What new challenges might we face? Consider emerging issues like ransomware, big data, artificial intelligence, and IoT devices.

Respuesta :

Hey Michelle! That's a really interesting question about cybersecurity. There are several threats to the cyber domain, and securing against them can be quite challenging. Here are a few examples:

1. Malware: This threat can affect all layers of the cyber domain. Malicious software like viruses, worms, and ransomware can infiltrate systems and cause significant damage. Securing against malware is challenging because cybercriminals are constantly evolving their techniques to bypass security measures.

2. Social Engineering: This threat primarily targets the persona layer. Social engineering involves manipulating people into revealing sensitive information or performing actions that compromise security. It's challenging to secure against social engineering because attackers often exploit human emotions and trust.

3. Distributed Denial of Service (DDoS) Attacks: This threat affects the infrastructure layer. DDoS attacks overload servers or networks, making them inaccessible to legitimate users. Securing against DDoS attacks is challenging because they can come from multiple sources simultaneously, making it difficult to distinguish legitimate traffic from malicious traffic.

Securing the cyber domain is an ongoing challenge, and it's unlikely that we'll ever completely eliminate these threats. As technology advances, new challenges may arise. For example, with the increasing use of IoT devices, there's a concern about securing the vast network of interconnected devices. Additionally, emerging technologies like artificial intelligence can be both a tool for cybersecurity and a potential vulnerability if misused.

Overall, the key to addressing future challenges is a combination of robust security measures, user awareness, and continuous adaptation to evolving threats. It's an ongoing battle, but with the right approach, we can minimize the risks and protect our cyber domain.
ACCESS MORE
EDU ACCESS
Universidad de Mexico