More Subjects
Top Three Security Threats Facing Generation Z?
[Author]
[Institution]
Introduction
The rapid development in the field of IT and technology as a whole, while making life easier, is also increasing the sense of uncertainty in our lives. We can no longer anticipate the threats that are making their way towards us and, as a result, we are unable to protect ourselves in an adequate manner ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"bARjuWZQ","properties":{"formattedCitation":"\\super 1\\nosupersub{}","plainCitation":"1","noteIndex":0},"citationItems":[{"id":1049,"uris":["http://zotero.org/users/local/0omESN17/items/NGXQWH4K"],"uri":["http://zotero.org/users/local/0omESN17/items/NGXQWH4K"],"itemData":{"id":1049,"type":"paper-conference","title":"Quantifying the Emergence of New Domains: Using Cybersecurity as a Case","container-title":"International Conference on Knowledge Science, Engineering and Management","publisher":"Springer","page":"324-336","author":[{"family":"Hu","given":"Xiaoli"},{"family":"Feng","given":"Zhiyong"},{"family":"Chen","given":"Shizhan"},{"family":"He","given":"Dongxiao"},{"family":"Huang","given":"Keman"}],"issued":{"date-parts":[["2018"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 1. Cybercrime is quickly becoming a global concern as the rising levels of criminal activities including cybercrimes like cyber-attacks, hacking, espionage/intelligence, cyber warfare attribution, and deterrence hinder the economic growth and distort law & order of the country ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"3sEJTBOl","properties":{"formattedCitation":"\\super 2\\nosupersub{}","plainCitation":"2","noteIndex":0},"citationItems":[{"id":1050,"uris":["http://zotero.org/users/local/0omESN17/items/8L7IXQL8"],"uri":["http://zotero.org/users/local/0omESN17/items/8L7IXQL8"],"itemData":{"id":1050,"type":"paper-conference","title":"Network Data Collection, Fusion, Mining and Analytics for Cyber Security","container-title":"International Conference on Machine Learning for Cyber Security","publisher":"Springer","page":"1-5","author":[{"family":"Yan","given":"Zheng"}],"issued":{"date-parts":[["2019"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 2.
Discussion
Cybersecurity is a multifaceted issue that passes through multiple domains and needs multi-dimensional initiatives. While means of intervention are already in place to counteract cybersecurity threats, their prevalence in the workplace has the potential to increase in a significant manner with generation Z becoming a part of the workforce. This generation is more tech-savvy as compared to their older counterparts. This is because they have been raised in the age of social media and smartphone and are not aware of a time or an age prior to this. They have taken to technology more readily than others and have no qualms about the vulnerabilities of a system that they take for granted ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"qn1yyhim","properties":{"formattedCitation":"\\super 3\\nosupersub{}","plainCitation":"3","noteIndex":0},"citationItems":[{"id":1051,"uris":["http://zotero.org/users/local/0omESN17/items/V24I7S4R"],"uri":["http://zotero.org/users/local/0omESN17/items/V24I7S4R"],"itemData":{"id":1051,"type":"book","title":"How to measure anything in cybersecurity risk","publisher":"John Wiley & Sons","ISBN":"1-119-08529-2","author":[{"family":"Hubbard","given":"Douglas W."},{"family":"Seiersen","given":"Richard"}],"issued":{"date-parts":[["2016"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 3.
According to a recent survey carried out by Microsoft, it was reported that Generation Z was more vulnerable to online tech support scams than any other population using technology at the moment ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"jeQeWEck","properties":{"formattedCitation":"\\super 4\\nosupersub{}","plainCitation":"4","noteIndex":0},"citationItems":[{"id":1052,"uris":["http://zotero.org/users/local/0omESN17/items/JBJEE2Q4"],"uri":["http://zotero.org/users/local/0omESN17/items/JBJEE2Q4"],"itemData":{"id":1052,"type":"webpage","title":"Massive IT Support Fraud ‘Made $10 Million From Thousands Of Elderly Victims’","container-title":"Forbes","abstract":"Hackers used fake virus alerts to dupe thousands of elderly PC users into coughing up cash.","URL":"https://www.forbes.com/sites/thomasbrewster/2019/09/19/huge-fake-it-support-scam-made-10-million-from-7500-victims/","language":"en","author":[{"family":"Brewster","given":"Thomas"}],"issued":{"date-parts":[["2019",8,19]]},"accessed":{"date-parts":[["2019",9,21]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 4. It is this vulnerability that makes online tech support scams one of the primary cybersecurity threats being faced by generation Z. Microsoft has cited the overconfidence of this generation regarding the use of technology in the matter as the reason why this generation, under its false sense of security as the reasons why they are the most vulnerable population.
Furthermore, pop-up ads/windows is another primary cybersecurity threat being faced by generation Z. As compared to older generations, they are more likely to lose money by involving in risky behavior by not being cautious in their approach ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"eItnldvt","properties":{"formattedCitation":"\\super 5\\nosupersub{}","plainCitation":"5","noteIndex":0},"citationItems":[{"id":1048,"uris":["http://zotero.org/users/local/0omESN17/items/ZPJPBQP3"],"uri":["http://zotero.org/users/local/0omESN17/items/ZPJPBQP3"],"itemData":{"id":1048,"type":"webpage","title":"Gen Z, millennials and males are the most vulnerable groups for tech support scams, new Microsoft report reveals","container-title":"Microsoft News Centre Europe","URL":"https://news.microsoft.com/europe/features/knowledge-is-the-best-defence/","language":"en-GB","author":[{"family":"Dedezade","given":"Esat"}],"issued":{"date-parts":[["2018",10,15]]},"accessed":{"date-parts":[["2019",9,21]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 5. In this regard, one can say that their risk online behavior i.e. visiting torrent and unsafe website as of result of familiarity with technology puts them at a greater potential for harm as compared older generations and adds to their vulnerability. Thus, it is essential that they are educated on the matter and taught to be conscious of the choices they make online.
Another threat that is commonly directed towards generation Z has more to do with identity theft and lack of privacy. Having a very public social life is very vogue now a day, with more and more teenagers opting for a very public social life. All of this is done in an effort to earn followers and admirers. However, these teenagers are also opening themselves to the possibility of not only being cyberbullied by others but also being catfished. These trends put their very identities at risk and make it possible for people to use their details and images to scam other people. These tactics are often put to great use by pedophiles into grooming young children and use them for their nefarious reasons ADDIN ZOTERO_ITEM CSL_CITATION {"citationID":"xrvGtQ8i","properties":{"formattedCitation":"\\super 6\\nosupersub{}","plainCitation":"6","noteIndex":0},"citationItems":[{"id":1054,"uris":["http://zotero.org/users/local/0omESN17/items/3WVH6GUE"],"uri":["http://zotero.org/users/local/0omESN17/items/3WVH6GUE"],"itemData":{"id":1054,"type":"article-journal","title":"The impact of social media on society","author":[{"family":"Amedie","given":"Jacob"}],"issued":{"date-parts":[["2015"]]}}}],"schema":"https://github.com/citation-style-language/schema/raw/master/csl-citation.json"} 6.
Conclusion
While this generation is most vulnerable in terms of cybersecurity threats, at the very same time this is the generation that is the most equipped to launch sophisticated cybersecurity attacks on almost all units on the society. This generation has never lived in a world devoid of technology and they are truly a master of their art. Sure, they blow caution to the wind when while using the internet, but their familiarity with technology also poses the greatest risk to the entire enterprise as a whole. Thus, while they are vulnerable, they have the capacity to make the system vulnerable as well.
Reference List
ADDIN ZOTERO_BIBL {"uncited":[],"omitted":[],"custom":[]} CSL_BIBLIOGRAPHY 1. Hu X, Feng Z, Chen S, He D, Huang K. Quantifying the Emergence of New Domains: Using Cybersecurity as a Case. In: International Conference on Knowledge Science, Engineering and Management. Springer; 2018:324-336.
2. Yan Z. Network Data Collection, Fusion, Mining and Analytics for Cyber Security. In: International Conference on Machine Learning for Cyber Security. Springer; 2019:1-5.
3. Hubbard DW, Seiersen R. How to Measure Anything in Cybersecurity Risk. John Wiley & Sons; 2016.
4. Brewster T. Massive IT Support Fraud ‘Made $10 Million From Thousands Of Elderly Victims.’ Forbes. https://www.forbes.com/sites/thomasbrewster/2019/09/19/huge-fake-it-support-scam-made-10-million-from-7500-victims/. Published August 19, 2019. Accessed September 21, 2019.
5. E. Gen Z, millennials and males are the most vulnerable groups for tech support scams, new Microsoft report reveals. Microsoft News Centre Europe. https://news.microsoft.com/europe/features/knowledge-is-the-best-defence/. Published October 15, 2018. Accessed September 21, 2019.
6. Amedie J. The impact of social media on society. 2015.
More Subjects
Join our mailing list
© All Rights Reserved 2023