Today we enjoy increased sophistication in computer and internet technologies, in terms of power, storage capacity and communication speed. The Internet has undoubtedly become essential for the world's economic competitiveness, innovation and well being. Though, advanced internet technologies have many advantages, However, the growth in technology also increases the opportunity of cyber crime (Edward A. 2006). The network-based applications pose security risks to individuals and to the information resources of companies and governments. The world wide connectivity of computer network has made computer crime an international issue. Cyber security deals with the protection of computers, networks, databases, data centres and applications, by designing effective procedures and methodologies.
In this paper, we will discuss main threats to the cyber security, a brief history of cyber security threats, situations of cyber security at present, along with the effectiveness of the counter measures taken so far. We will also evaluate expected threats to cyber security in the near future.
Discussion
Historical Situation of Cyber Security Threats
The concept of cyber crime existed even before the development of personal computers.
The criminals which were then known as "phone phreaks", used to break into the computerized phone systems. By hacking the phone systems, they made free long-distance calls. In the 1990's when companies and academic institutions actually started to use computers, the name of great hacker Kevin Mitnick came into light. In late 1990s and early 2000s, the famous viruses such as "Melissa" and "I Love You" created serious threats to the cyber security. These viruses are mainly considered responsible for initiating the antivirus and worm protection software, which has now become a multibillion-dollar industry. As the use of computer spread to the all areas of business, academics, science and technology, military, government organizations, the cyber threats got more developed and organized. Main motivations for the hackers include accessing the critical information and then use against the organization or person. Also, advancement in social networking give rise to the threats such as spamming, phishing, and intrusion into privacy.
Assessment of the Current Situation
Over past few years, cyber security threats have become much more organized. Hackers or intruders now are more focused in causing and designing the systems for organized crimes. They plan the intrusion with goals. If we looked at the situation of cyber security few years ago, the intruders were not as focused and organized as today. They would just enter into the system, try to search for something valuable and then get out. Situations are completely different today. Prior to intruding in any system, the hackers set clear target for their goals. They look for vulnerabilities in the victim's system. Also, more advanced techniques for intruding into military and defence systems have been developed during the past years. Surprisingly, even less trained hackers are easily able to use those with a little experience. Threats also involve the innovation of more destructive capabilities. For example, in one case hacker may just break into the system for stealing some information, while, in ...