W5DQ Week 5 Discussion Question Watch the below video and discuss if you agree or disagree with the speaker. https://www.youtube.com/watch?v=CWCKlAcxESA Your initial response is due by Thursday 1

Yes, I do agree with Mr. John LaCour as Humans remain a vulnerable link to incorporate data security, but you might be shocked that it is not just rank-and-file workers duped by phishing scams that face risks. When the environment is more integrated, the possibility of cyber-security threats and cyber-crime rises. This is because more data is accessible on the Internet and is being tracked on a daily basis. It may even seem paradoxical-data can be more secure and at the same time more vulnerable. This triggers an alert because hackers pose a tremendous risk of accessing private data and the related information available on the Internet. The effect of a single, effective cyber assault may have far-reaching effects, including financial damages, infringement of intellectual property, and lack of customer interest and trust (Yousaf et al., 2018).

The total socioeconomic effect of computer crime on culture and policy is measured at billions of dollars each year. Criminals exploit electronics in a number of forms. In fact, the Internet is a perfect platform for scammers and other miscreants, as it helps them to indulge in their trade while hidden behind a wall of digital anonymity. Being a target of cybercrime may have long-lasting impacts on life. One popular tactic utilized by scammers is phishing, sending fake emails that purport to come from a bank or other financial entity seeking personal details. When one turns over this material, it can cause the perpetrator to access one's bank and credit cards, to create new cards, and to kill credit scores (Barau, 2016).

 

References

Barau, A. S. (2016). Cyber insecurity as a manifestation of new form of global urban vulnerability. Imam Journal of Applied Sciences, 1(1), 27.

Coffey, K., Maglaras, L. A., Smith, R., Janicke, H., Ferrag, M. A., Derhab, A., ... & Yousaf, A. (2018). Vulnerability assessment of cyber security for SCADA systems. In Guide to Vulnerability Analysis for Computer Networks and Systems (pp. 59-80). Springer, Cham.