Cybersecurity risks between the U.S. and other countries

Comparing cybersecurity risks between the U.S. and other countries typically involves a lot of data. Symantec has created an index of cyber crime activity that includes hosting malware, botnets, phishing server hosting, and how many botnet command and control servers there are within each nation. The top Five nations on this index include the US, China, Brazil, Germany, and India. This means these are the 5 countries with the most cybersecurity risks. Spam comes from botnets, which are found mainly in china, India, Russia and Vietnam. While we may think spam is just a nuisance, it is actually very harmful and once the botnet has infected the pc, more spam comes in, which can contain malware, viruses, worms, etc. The united states is prone to phishing attacks, being targeted the most of any county, 60% of all phishing attacks occur in the United States. China, however, is one of the top countries in which most phishing attacks come from. Ransomware schemes continue to rise as well, which is when a cyber crime victims computer is infected with malware , that searches for files important to the user and then it encrypts them, making them inaccessible to the victim without the decryption key or a passcode. The cyber criminal then contacts the user demanding a payment in order to be given the key so that the user can recover their inaccessible data. Studies show that the U.S. and china are both one of the top targeted countries in regards to ransomware, with china being in the top 3. The United States, while by no means is not the safest country in the cybersecurity world, it as a whole is actually in the upper echelon tier of safe. China, a country that draws comparisons, is very unsafe in the cybersecurity world. China not only has a high rate of cyber security attacks “dished out” from it, it also suffers from a lot of attacks within itself. China is one of the top 3 countries in suffering from telnet attacks and is by far and away the most affected country by SSH based attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *