Threats and future of cybersecurity

Save this page for later by
adding it to your bookmarks
Press Ctrl+D (Windows)
or Cmd+D (Mac OS)

Security Issues with Ubiquitous Data, Mobile Devices, and Cybersecurity Considerations

There have been a number of operational concerns on ubiquitous applications and data which have been resolved, security issues remain a big hindrance to large-scale acceptance and usage of ubiquitous data applications. Automatic configuration and management of ubiquitous systems must be addressed. Another security concern is the capability of operating in low-resource devices and secure mobility management. Authentication mechanisms, as well as credential management of ubiquitous data and applications, must be addressed too. Other security issues with ubiquitous data include authorization and access control management, heterogenous security support, one-to-one and group secure communication, and shared data integrity (Al-Jaroodi et al., 2010).

Both mobile devices and the networks they run on can be a playing field for cybercriminals. These criminals can compromise classified, confidential, and sensitive data that mobile devices carry. One primary security weakness comes from the fact that mobile devices such as smartphones and tablets regularly rely on wireless networks which are unsecured. Users fail to use strong encryptions and password controls. Some of the cybersecurity considerations in regards to security of mobile devices should include intrusion detection systems, strong authentication mechanisms, access data control, and data confidentiality. These considerations should be implemented on resources which these devices run on.

Cybersecurity-Implications for Cloud Computing

According to Mattoo (2017), with increased cloud computing activities, security has become a challenge in this area of technology. Many people are storing their data in clouds giving cybercriminals easily accessible areas of attacks. In cloud computing, a few broad issues are put into consideration when it comes to cybersecurity. (1) Confidentiality, concerns on whether data can remain private comes into play. The strength of encryption systems needs to be professionally designed and tested to ensure that the data remains private to the owner only.  (2) Access control, users want to know who is privileged to access the stored data. Does the service provider of the cloud have full control over the data location? (3) Integrity, the cloud vendor’s ability to maintain 100 percent data accuracy and completeness. (4) Recovery, users want to know the recovery measures put in place in case of disasters to restore data and how long it would take.

Generally, cloud computing is only effective when issues of cybersecurity are addressed. The primary control categories that a cloud computing vendor should be worried about include corrective controls, detective controls, deterrent controls, corrective controls, and preventive measures. Cyber-crime has increased with increased cloud computing where criminals exploit the weak controls and security mechanisms of unsuspecting data owners and vendors (Shrivas, Singh, & Dubey, 2016).

Cybersecurity-Implications for Quantum Computing

Quantum computing has become a new source of threat to cybersecurity. According to Global Risk Institute (2016), approximately 50 percent of current cryptography tools will be broken in a decade and a half. The cyber threat comes from the ability of quantum computing to perform tasks far from the reach of a normal computer. A quantum computer can simultaneously execute limitless configurations of 0s and 1s by manipulating qubits, a collection of quantum bits. Some of the normal and routine activities that quantum computers are able to hack include sending email, checking online bank account, updating social media status, and upgrading software on a smartphone. It is clear that quantum computing in the hands of cybercriminals is bound to increase data breaches and expose the online community to more insecurity (Totzke, 2017).

Did you like this sample?
  1. Al-Jaroodi, J., Mohamed, N., Al-Abdouli, F., Al-Dhaheri, A., & Jawhar, I. (2010, February 19). Security middleware approaches and issues for ubiquitous applications.
  2. Global Risk Institute. (2016, September 26). Quantum Computing: A New Threat to Cybersecurity.
  3. Mattoo, I. A. (2017). Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review. International Journal, 8(2).
  4. Shrivas, A., Singh, O., & Dubey, M. (2016, March). Security concerns and remedies in Cloud Computing. In Electrical, Electronics and Computer Science (SCEECS), 2016 IEEE Students’ Conference on (pp. 1-6). IEEE.
  5. Totzke, S. (2017, May 23). How quantum computing increases cybersecurity risks.
Find more samples:
Related topics
More samples
Related Essays