There are many current cybersecurity threats in our current landscape due to the growing presence of technology in everyday life. They can take many forms and can attack at any time. The ones discussed in our readings consist of nuisances, data theft, cyber crime, hacktivism, and destructive attacks. Each form of the threats serve a different purpose and the perpetrator commits the attack for different motives. Examples of each are given in the article assigned in our reading for this module. A nuisance example could be botnets and spam, where they are trying to gain access to information. Unfortunately, many botnets and spam are targeted to victimize the elderly as they are more foreign to modern technology and can be more susceptible to such spam mail and bots. Most of the time, these cyber-threats are automated as opposed to individual people committing the infringement. Data theft can be used as political advantages, as was prominent in the 2016 US Presidential election and the media coverage following the controversial event. Cyber-crime is primarily used for financial gain in any type of way. People are able to steal credit card information extremely easily to make fraudulent purchases online. In this instance, it is important to make sure all websites that one is ordering products, services, or is giving any form of payment to are legitimate websites and not fraudulent. Perpetrators just sit and wait for the perfect opportunity to commit these acts. Hacktivism is usually used for “defamation, press, and policy” purposes. Destructive attacks are a little different, typically utilized to “disrupt operations and delete data” (Introduction to Cyberthreats, Course 10, Tutorial 2, 2015). The motive can be traced back to conflicts in this instance.

Work Cited (n.d.). 01a – Into to Cyber ThreatsCourse10-Tutorial2.pdf. Retrieved from
https://drive.google.com/file/d/1TLqf9MshI3rmuVVggJiaUOOK0ozkhNZp/view