Forum Description Emerging Threats - As technology grows and change, there are new emerging technologies that are created like AI and robotics. With new technology there are also emerging threats. Ple

Emerging Threats - As technology grows and change, there are new emerging technologies that are created like AI and robotics. With new technology there are also emerging threats. Please research and describe in your own words at least 2 emerging threats, the technology it is related to, and potential countermeasures for those threats.

As the new technology is emerging their threat is also emerging with the technology. After some research on emerging technology, the 2 emerging threats are as follows-

IoT security threat- In this, hardware-based endpoint security solutions are implemented in IoT and AI devices, users leave themselves vulnerable to cyber attacks (Razzaq et al., 2017). With the intelligence that includes AI and IoT devices, malware attacks result in the low-level cyber security (McGrath, 2017) It shows that the data saved is vulnerable to understand by a third party and removed from devices (Razzaq et al., 2017). The result of IoT security threats can determine the problem while implementing IoT devices that feature AI. In this, security threats such as DDoS, ransomware attacks can be utilized to steal crucial data from users. In this, attackers can exploit protection vulnerabilities in IoT infrastructure to perform advanced cyber-attacks (Razzaq et al., 2017).

 Countermeasure of IoT threats-

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Make sure that the connection between the network is secure and authenticated (McGrath, 2017).

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Initiate penetration tests in the network with data encryption features.

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Use IT policies to protect the network from these types of attacks.

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Update all firmware and firewalls to secure the devices.

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; While using IoT devices with AI features, use a separate network that unable to access the critical files from the side of intruders if an attack occurs (McGrath, 2017).

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Update and install IoT firmware and check regularly to automate the patch distribution.

Blockchain threat- Due to a broad start with the technology their security is often taking a backseat to growth towards cryptocurrency companies but fails in this section (Mcafee, 2020). In business, these threats are involved who are well-adopted the implementation of blockchains such as Ethereum and Bitcoin. Attackers have utilized several methods to target users and businesses. Though this, primary attack vectors include Malware, Phishing, DoS attack, and many more that implement many vulnerabilities. It has grown the most emerging technology for managing digital transactions (Mcafee, 2020). Blockchain technology advances many cryptography benefits such as digital signatures, hashing, and many more to secure the network from attackers. With technology, Blockchain has suffered from different cybersecurity threats and vulnerabilities. promises a new dimension of conducting business transactions between the untrusted entities (Mcafee, 2020). This causes attack if the process of encryption is not secured and authenticated. Sometimes these threats can cause the attack in the network, decentralized database, and transaction process that might expose the security weakness at the endpoints (Mcafee, 2020).

Countermeasure of Blockchain threats-

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Use good antivirus for the devices and update both AV and OS.

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Always use a reputable encryption application to keep the blockchain keys safe and secure.

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Use an encrypted platform for payment process and validate that the payment methods are verified or not (Mcafee, 2020).

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Use internal standardization and policies for blockchain.

•&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Make sure that the sharing of files via email contains the blockchain wallet and does not include keys in the body of any email (Mcafee, 2020).

References-

Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). Security issues in the Internet of Things (IoT): a comprehensive study. International Journal of Advanced Computer Science and Applications, 8(6), 383.

Mcafee, (2020). Retrieved from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-blockchain-security-risks.pdf

McGrath. T (February 15, 2017 ). Retrieved from https://www.bcs.org/content-hub/11-ways-you-can-avoid-iot-threats