{"id":313,"date":"2023-02-04T23:11:58","date_gmt":"2023-02-04T23:11:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rknap004\/?p=313"},"modified":"2023-09-09T23:17:15","modified_gmt":"2023-09-09T23:17:15","slug":"eportfolio-entry-4","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rknap004\/2023\/02\/04\/eportfolio-entry-4\/","title":{"rendered":"CYSE 200T-ePortfolio entry #4"},"content":{"rendered":"\n<p>Q: <strong>Compare cybersecurity risks in the U.S. and another country.<\/strong><\/p>\n\n\n\n<p>A: Cybersecurity threats and risks continue to grow and threaten users of technology as time goes on, especially in our country of the United States; however, it&#8217;s also important to note that cybersecurity risks can also affect anyone from around that world. In fact, even large countries such as China can go through practically the same malicious and dangerous cybersecurity attacks that the United States does. According to Alex Kigerl, a writer for Washington State University, states that the most common instances of &#8220;cyber crime&#8221; in the world, like spam, botnets, phishing emails, and ransomware attacks, occur in both the United States and China (Kigerl p. 148). In fact, in terms of cyber attacks, the United States and China are among \u201cthe top 5 nations\u201d that are the most targeted countries for cyber based attacks, with \u201cBrazil, Germany, and India\u201d behind them (Kigerl p. 148). Despite being so targeted by hackers, there are varying differences between the two countries. For example, botnets, or a \u201cnetwork or cluster of malware-infected machines\u201d that sends spam emails, are more likely to be found to be sent to China, with the United States not even making the top 5 (Kigerl p. 149). On the other hand, phishing emails, where an individual attempts to steal personal information or \u201c\u2018goods\u2019 through deceit\u201d, is more common in the United states, with a whopping \u201c60% of worldwide\u201d phishing attacks out of the entire world (Kigerl p.149). Furthermore, both the United States and China are huge targets for ransomware attacks, which is the event where a hacker encrypts an individual\u2019s computer or files, \u201cmaking them inaccessible to the victim\u201d, unless they pay the hacker to decrypt it (Kigerl p. 150). In comparison though, the United States also faces more \u201cadvance fee fraud\u201d attacks, which is similar to phishing emails in which a malicious entity offers a user some reward in return of providing an \u201cadvance fee\u201d (Kigerl p. 149). In essence, China seems to fall more susceptible to attacks that come from computer malware or programs, while the United States appears to be more susceptible to social-engineering based attacks. All the same though, the prevalence of cybersecurity risks everywhere continues to prove that cyber threats are becoming more and more of a glaring risk for the world.&nbsp;<\/p>\n\n\n\n<p>References: <\/p>\n\n\n\n<p>Kigerl , A. (2016). <em>Cyber Crime Nation typologies: K-means clustering of countries based on Cyber Crime Rates<\/em>. cybercrimejournal. Retrieved February 4, 2023, from http:\/\/www.cybercrimejournal.com\/Kigerlvol10issue2IJCC2016.pdf <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Q: Compare cybersecurity risks in the U.S. and another country. A: Cybersecurity threats and risks continue to grow and threaten users of technology as time goes on, especially in our country of the United States; however, it&#8217;s also important to note that cybersecurity risks can also affect anyone from around that world. In fact, even&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rknap004\/2023\/02\/04\/eportfolio-entry-4\/\">Read More<\/a><\/div>\n","protected":false},"author":24879,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/313"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/users\/24879"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/313\/revisions"}],"predecessor-version":[{"id":395,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/posts\/313\/revisions\/395"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/media?parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/categories?post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rknap004\/wp-json\/wp\/v2\/tags?post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}