Keywords
Cyber Secruity, Credential stuffing, Phishing, Malware
Abstract
Every year, millions of people have their credentials stolen by cybercriminals. Criminals use simple techniques such as phishing to manipulate people into giving up their usernames and passwords. This can lead to major assets being compromised or stolen. Unfortunately, criminals know that many individuals reuse the same passwords or variations of the same password across many sites. Criminals use this information to test stolen passwords on other sites, which can be done on a massive scale. Such attacks can become life-threatening and destructive to many companies and individuals.
Recommended Citation
Larson, Jaiden
(2024)
"The Dark Truth about Cyber Security,"
Marriott Student Review: Vol. 7:
Iss.
2, Article 3.
Available at:
https://scholarsarchive.byu.edu/marriottstudentreview/vol7/iss2/3
Marriott Student Review is a student journal created and published as a project for the Writing for Business Communications course at Brigham Young University (BYU). The views expressed in Marriott Student Review are not necessarily endorsed by BYU or The Church of Jesus Christ of Latter-day Saints.