From the course: Learning Cryptography and Network Security

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Exploring cyberattacks and trends

Exploring cyberattacks and trends

A cyberattack can compromise sensitive data. In this video, we'll explore current trends in cyberattacks and some of the key drivers for implementing encryption. First, let's talk about some current trends. Administrators face numerous challenges to protect the infrastructure. Attackers range from the disgruntled employees to crime rings and nation-states. Every organization and government is a potential target. The attacks are highly organized by skilled and motivated players and have resulted in exposure of massive amounts of sensitive data, such as credit cards, medical records, intellectual property passwords, and state secrets. Cyberattacks attempt to gain access to a system, modify or destroy data, or lock out users. Attacks occur every minute of every day, as we can see from this cyber threat live map at kaspersky.com. Businesses constantly fight against the ongoing threat of attackers exfiltrating terabytes of data. So next, let's talk about the impact of these attacks. In…

Contents