table II.3 Mitigation of Threat II.4 Conclusion






table of contents

Summary………………………………………………………………………………… 2

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

 Threat 1………………………………………………………………………………..…………………

II.1 Description of

II.2 Nature of Threat

II.3 Mitigation of Threat

II.4 Conclusion

 Threat 2……………………………………………………………………………………….…………. 5

of Threat

 Nature of

 Mitigation of


 Text References


I. Executive Summary

In this
report, I will be writing about the internet security threats listed under the
“The Threat Landscape in 2014 and Beyond: Symantec and Norton Predictions for
2015, Asia Pacific & Japan”

Over the
years the battle between those wanting to create new threats and exploit
vulnerabilities and those that want to protect against them are very likely to
intensify. Growth in the Internet of Things means consumers will be more
connected—and with this connectivity comes the potential for even more security

Will the
Internet of Things invite a whole new wave of security attacks?

The two
threats I have chosen to write about are;

will continue to run profitable ransomware scams.

Why this is so being attackers
have developed their techniques while enterprises in all sectors have failed to
patch out critical security loopholes. So many businesses are susceptible because they’ve failed to implement
the crucial security precautions, including offline backups. Everyone moved
away from offline backups with it being slow and such. Nowadays, with cloud and
online backups, people have totally neglected it. Therefore, if your PC is
caught, what other choice do users have but to pay the ransom to get back
control over his system.


denial-of-service (DDoS) will continue to rise as a threat.

Once the realm of bored
teenagers engaging in some wanton cybervandalism, they are now a favourite tool
of career cybercriminals, hacktivists, and even nation states.

With the availability of
ready to use DDoS tools that can be found online it’s no surprise that DDoS is
so popular and widely executed.

The advancement of the Internet of
Things is making millions of poorly secured devices available to be roped into
botnets too.


threat 1

Scammers will
continue to run profitable ransomware scams.


II.1 Description of Threat

According to
Symantec’s Internet Security Threat Report, ransomware attacks grew by 500% and
turned vile in the latter part of 2013. This growth was largely due to the
success of Ransom crypt, commonly known as Crypto locker. This aggressive form
of ransomware made up 55 percent of all ransomware in the month of October

How this
threat works is by encrypting a user’s files and then proceed to request a
ransom for the files to be unencrypted. Ransomware causes even more damage to larger
organisations where not only the victims’ files are encrypted but also files on
shared network drives in the company. Recently these people have started to accept
ransom fee using online electronic payment systems such as Bitcoins to get
around the peoples’ inability to pay the fee. Ransomware makers like the inconspicuousness
and accessibility of electronic payments that are readily available, posing a
greater threat to enterprises and consumers from losing data, files or their system.


II.2 Nature of Threat

This threat uses
a certain malicious software that inhibits user access to folders or the
computer system, holding it hostage using encryption unless the victim pays a sum
of money to get back his system with a key that the crook gives him upon receiving

has been a preeminent threat to companies and all users alike since the
mid-2000s. Reports from the Internet Crime Complaint Centre (IC3) say that
there were more than 7,600 ransomware attacks in 2005. In 2015, 2,453 incidents
were reported to the IC3. These cost victims over 1.6 million.

The first
attack came about in 1989 by Joseph Popp, who carried out the attack by passing
out 20,000 floppy disks to other researchers, saying that those disks contains
a program that could report an individual’s risk of getting AIDS. However, the
disk also had a malware that remains dormant at first, only springing up after
a system was powered up 90 times. After the threshold was reached, the malware activated
and locked the victims’ system, requesting for $189 and $378 for a release.
This attack became known as the AIDS Trojan, or the PC Cyborg. This attack
shows how much damage the threat can cause. Locking doctors and researchers out
of their computers and hindering their work.


II.3 Mitigation of Threat

There are several
steps that users and enterprises alike can follow to lower their risk of
falling victim to ransomware greatly. Following basic cybersecurity practices for
example – in particular, backing up data regularly, keeping software
up-to-date, and keeping oneself updated on the common ways ransomware are being
spread will go a long way in resisting ransomware.

nowadays backup data only within their own network which is not effective since
a single attack will still cripple access to the backups. It is a good practice
to create a backup copy somewhere else as a fall-back if a ransomware hits the
main network.

Users should
also take time to educate themselves about ransomware distribution methods such
as phishing and spoof websites. Learning about the signs of a fake website and
avoiding it can save users a lot of trouble.

II.4 Conclusion

As the
people grow with the internet, many good things are created but this goodness
are abused by the hackers, turned into malicious tools for their personal
goals. Encryption, a method of safety is used to demand money from another.
However, this will not happen to anyone that doesn’t let it happen to them.
Arming oneself with knowledge is the most basic method of protection. Not
applying cybersecurity fundamentals just spells trouble at the end of the day.


Threat 2

denial-of-service (DDoS) will continue to rise as a threat.

III.1 Description of Threat

DDoS stands
for Distributed Denial of Service basically meaning using many different
computers to simultaneously flood a target with requests until it cannot handle
them and fails, stopping service to the other legitimate users. There are many
different reason for one to carry out a DDoS attack. Hacktivism, profits and
disagreements being the main reasons. Considering how easy it is to carry out
large DDoS attacks, DDoS attacks are expected to grow in the future. The chances
of being targeted by short but all-out DDoS attacks is increasing.

III.2 Nature
of Threat

softwares for DDoS attacks are so readily available on the internet, its not
hard for anyone to acquire the tools to try it for themselves. A teenager for
example could DDoS his friend for winning him in a game to try and gain an
advantage in a rematch. Of course, bigger and more developed sites are harder
to take down with just the processing power of one computer, he can then call
his friends to help him flood the site too, eventually taking it down.

The first
DDoS stack happened around 1999, and the University of Minnesota was the target.
It affected 227 systems and rendered the server useless for a few days. Attacks
continued, and in the following year 2000, larger sites like CNN, eBay, and
Amazon were attacked. These attacks were carried out by a teenage Canadian
hacker with the handle Mafiaboy. He coordinated them by converting host
computers into zombie computers and used them to inseminate the attacks.