Cyber-attacks are not just in fiction movies, they are a reality of our world. The cost of cyber-attacks are estimated at $100 billion to $1 trillion annually (Eschelbeck, 25). The reason of this is not difficult to understand. Computers are present everywhere. People are always connected posting information about their lives on Facebook, Instagram and Twitter.
On the commercial field is the same. The most part of enterprises have their bases computerized. All the transactions and important information are in computers. Cyber Security is now one of the biggest necessities of the world, because our lives resolve around computers, the cyber-attacks are dramatically increasing in number every day, and the cyber attackers are becoming more expert.We are addicted to technology. Americans ages 18-64 who use social networks say they spend an average of 3.
2 hours per day doing so(Vacca, 10)The virtual life became as important as real life. For the most part of the people that has online access to this virtual media is hard to pass more than, one day without checking the news on the internet. Hang out with friends and meanwhile talk to others virtually is very common. We put all information about ourselves on a computer. On virtual media we are connected with people worldwide, we have information about our life, and the commons tasks that we do every day. In the same time that is nice, but this is very dangerous.
According to the Fukuoka Rosa 2Statistic Brain website, there are more than 1.4 Billion Facebook users worldwide and 98% is the percentage of 18-24 years olds who already use social media. This means that it is very easy to find personal information about the most part of people. This information are target of advertisement . .of stolen information nowadays, the number of cyber attacks are increasing as well as the quality of these attacks.
For this reason, it is very important users and enterprises pay more attention in cyber security. Follow the security instructions and to invest in security tools are indispensable to have a safe system and to avoid cyber attacks. Works CitedBishop, Matt. Computer Security (2004): 100 – 110. Print.Dunn Cavelty, Myriam.
“Cyber-security and threat politics” The New York Times (2008). PrintEschelbeck, Gerhard “Security Theat Report 2014” SOPHOS (2014). PrintHarden, Seth. “Social Networking Statistics” Statistic Brain. Web 01 January, 2014 <http://www.statisticbrain.
com/social-networking-statistics>.Pfleeger, Charles P. Security in Computing (2006): 25 – 50. Print. Vacca, John R. “To the Barricades: Cyber Security” The Economist (2007).