Cybersecurity and Cyberattacks in Businesses and Everyday life

Cybersecurity is a vast topic in today’s society, yet most people still don’t know about its differentiations. There are many different forms of cybersecurity throughout the world, and there are many other things that we need cybersecurity for.  With cyberattacks always happening around the world there needs to be some to counter those attacks or prevent them from occurring. Cybersecurity in a business is much different from cybersecurity in everyday individuals, but they can also have similarities. 

“The majority of individuals have grown to rely heavily on technology in today’s digital era to do their everyday duties. Cyberattacks have grown in number along with technical improvements. There have been significant security breaches in recent years. When sensitive data is compromised, businesses and customers are both impacted”(Balan et al.) Whether you work for a small or large company, we all rely on computers on a daily basis. Since we all rely on these things, we need security. The National Institute of Standards and Technology (NIST) should be used by businesses to create a network security policy. The NIST assists companies in prioritizing and coordinating their efforts to protect themselves from threats, risks, and resources that are both present and emerging. The Framework Core comprises five components that cooperate to support identification, protection, detection, response, and recovery. Use strong passwords for all of your personal information if you’re an individual and want to lessen the likelihood that your data will be compromised. Cyber attacks on businesses have been steadily increasing throughout the years, but this framework or any other type of framework can help reduce the possibility of cyber attacks. As there will always be newer frameworks to better organizations’ cybersecurity; newer forms of cyberattacks will also be on the rise. “Technology is developing swiftly in a society dominated by social networks, internet transactions, cloud computing, and automated processes. However, as technology develops, cybercrime does as well, producing new tools and tactics that enable attackers to infiltrate more complex or tightly regulated environments and cause harm. There will always be something that weakens the defense, no matter how many times we reinforce them over time. The average frequency of data breaches and cyberattacks rose by 15.1% in 2021 compared to the previous year” (Brooks). There are many different forms of attacks that businesses have to worry about. Similar to businesses, even in everyday life you can come across the same problems. 

 Harm can even be done by the company’s own workers in the workplace, this can also be recognized as workplace deviance. Cyber technology has changed everyone’s daily life, especially in the workplace. With all the new technologies created and further information we have, it’s easy to sabotage simply through the web. This gives workplace deviants a chance to hide behind their screens and avoid being compromised in person. “The specific deviant work behavior categories that have received more attention in the past ten years are workplace abuse, ostracism, bullying, sexual harassment, and abusive and destructive leadership. This data suggests that interpersonal rather than organizational deviant work behavior is receiving much more attention. Also discussed are the study’s limitations and theoretical and practical field implications are also discussed theoretical and practical field implications”(Zappalà et al). Some of these can transfer over to individuals as well. One of those similarities is cyberbullying; Cyberbullying is the use of bullying over digital devices such as cell phones and computers. “Cyberbullying is deliberate, a repeated pattern, and inflicts harm. This can be done through a variety of mediums such as text messages, social media, online forums, gaming communities, email, and more”(Patchin and Hinduja). The most common place where cyberbullying occurs is social media such as Facebook, Instagram, Snapchat, Twitter, and Snapchat; text messaging and messaging apps; online forums, and message boards. Some behaviors that are reflective of cyberbullying include but are not limited to hurtful comments, threats, rumors, pictures, or videos intimidating, deceiving, harassing, humiliating, and impersonating someone else. Cyberbullying can also take place in person, on the contrary, this would be the process of bullying. Similar to cyberbullying and bullying; cyber attacks can also happen through the web or in person. 

Every infrastructure attack is typically divided into two categories: physical attacks and cyberattacks. “In a physical attack, an attacker physically gains access to a physical item in the infrastructure system with the intention of damaging it, rendering it inoperable, stealing it, or using it inadvertently. The attacker disables or gets around access controls using force, stealth, or deception, then finishes the attack by manipulating the system”(Wyss et al.). Physical attacks can disrupt cybersecurity in a business, showing that there is a vulnerability in physical security. It can be as simple as picking up a USB drive and putting it into your computer because of curiosity. According to (Resolver), Every time the attacker has shown that there is a hole in physical security, it shows up as a flaw in the controls (locks, card readers, infrastructure exposure), a flaw in security training, or a problem in staff conduct. With this knowledge, the threat actor can repeatedly recreate the attack, obtaining entry to the building whenever necessary. There are ways that both physical and cyberattacks can be reduced like simple tools that take industry-recognized best practices into account and can be used to assess the physical security of a building, as can more sophisticated systems that create adversary and defender timelines tailored to specific scenarios. The objective is to create a security system with physical protection that is balanced for any circumstance where an enemy could appear (Wyss et al).

On the other hand, cyber-attacks are where hackers or attackers hide behind a screen and try to find a vulnerability in the system. “In a cyber attack, adversaries accomplish their goal by cyber manipulation of the system (e.g., turning components off, changing set points, disrupting flows, deleting data, etc.) without ever gaining physical access to the affected component”(Wyss et al). This is where the frameworks come in and help resolve the is, frameworks like the NIST.

In today’s culture, cybersecurity is a big topic, but the majority of people are still unaware of its differences. Worldwide, cybersecurity takes many various shapes, and it is also necessary for a wide range of other purposes. There must be measures to defend against or stop cyberattacks because they occur constantly all over the world. Although they can potentially be similar, cybersecurity at a business is considerably different from cybersecurity with regular people.

Works Cited

Balan, Shilpa, et al. “Data Analysis of Cybercrimes in Businesses.” Information Technology and 

Management Science, 2017, Data Analysis of Cybercrimes in Businesses | Balan | Information Technology and Management Science.

Brooks, Chuck. “Alarming Cyber Statistics for Mid-Year 2022 That You Need to Know.”

 Forbes, Forbes Magazine, 12 Oct. 2022, Alarming Cyber Statistics For Mid-Year 2022 That You Need To Know.

Englander, Elizabeth. “Childhood Access to Technology and Cyberbullying.” Journal of Pediatrics and Pediatric Medicine, 19 Mar. 2019, Childhood Access to Technology and Cyberbullying.

Patchin, Justin, and Sameer Hinduja. “What Is Cyberbullying?” Cyberbullying Research Center

n.d., What is Cyberbullying?.

Resolver, Resolver. “Physical & Cybersecurity Defense: Hybrid Attacks.” Resolver, 16 Mar. 

2022, Physical & Cybersecurity Defense: Hybrid Attacks | Resolver.

Wyss, Gregory Dane, et al. “Identifying and Defeating Blended Cyber-Physical Security 

Threats.” Identifying and Defeating Blended Cyber-Physical Security Threats. (Program Document) | OSTI.GOV, 1 Jan. 2007, Identifying and Defeating Blended Cyber-Physical Security Threats.

Leave a Reply

Your email address will not be published. Required fields are marked *