Wednesday, May 6, 2020

Importance of Cyber Security - 1744 Words

The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, â€Å"The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.† (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified†¦show more content†¦(United States Executive Office of the President, 2009). Though seemingly constructive measures, this order falls short within the administration. The success of the administration’s 60-day policy review relied heavily on report findings, however privacy of information placed barriers on the mission, moreover, the issue of classified information presented challenges. The final report delivery made a powerful statement about cybersecurity threats and urgency, and the administration’s need to communicate a response. (Cate Laurie, 2009). Consequently, this prompted the president to appoint a privacy official reporting to the new cybersecurity coordinator. As the current administration acknowledges the majority of infrastructure is owned and operated by the private sector, it’s noted that the president is adamant that his administration won’t dictate security standards instead they will work together to find technology solutions. (Cate Laurie, 2009). Also noted during the President’s East Room announcement was his promise on a new approach to keep and protect the American’s personal privacy. To date, no real action has been implemented to solidify any legal change. Administrative Policy Differences Cyersecurity has been on the forefront of policy priority for legislative administration for several years, cybersecurity protection doesn’t fit into conventional or traditional security problems. As technology has advanced,Show MoreRelatedThe Importance of Cyber Security1093 Words   |  4 Pagesuse and lack of protection from cyber security, more and more people are becoming victims of cyber bullying, or the teasing and discrimination of others through online sources. The internet not only offers communication tactics, but also ways to keep track of your finances and shop from home. Identity theft through hacking is well known among the ones who risk putting their personal banking information online. Because of all the crime, the demand for cyber security is steadily increasing. With jobRead MoreCyber Defense And Security Issues789 Words   |  4 PagesUnderstanding cyber defense and security issues such as cyber-crime and cyber-attacks ensure efficient functioning of inf ormation systems. Cyber-attacks are real, unexpected and increasing in numbers according to Naumovski and Kenkov (2014) cyber defense is emerging as a high priority with the increased use of information technology. Naumovski et al. (2014) noted that understanding cyber defense and security issues would ensure efficient operation of information systems. Naumovski et al. (2014)Read MoreThe Internet And Its Effects On The Environment1538 Words   |  7 Pagesthe Canadian government has published â€Å"Canada s cyber security strategy: For a stronger and more prosperous Canada†, a strategic platform to secure the Canadian cyberspace. However, although embracing cyber technology and obtain considerable advantages from it, the Canadian cyber security strategy does not reflect as a comprehensive strategic framework. This essay argues that the strategy lacks of substantial elements to deal with a wide range of cyber threats in today’s modern world. For this reasonRead MorePrevention / Containment Measures For Cyber Threats1406 Words   |  6 Pages1. Prevention/Containment Measures for Cyber Threats. Protecting classified documents or valuable information is very hard against any kind of cyber-terrorism, there are no universal safeguards. There is no existence of any agreement or policy to define cyber-terrorism. Threats can come from hackers, criminal group or terrorist group; governments use computers and internet to attack without knowing the victims. It is not easy to stop such attacks but not impossible to stop if following basic preventionRead MoreThe Prospect And Challenges Of Cyber Security Insurance922 Words   |  4 Pages2.0 Introduction This chapter presents the prospect and challenges of cyber security insurance among It practitioners in the United Kingdom based on the literature that had been reviewed in the process of writing this paper. This chapter will draw upon results of earlier studies and reports to provide a theoretical framework to answer the research questions of the paper. 2.1. Cyber security and its importance to the modern lives In line with technological advances and the evolution of the internetRead MoreAmerica And Its Homeland Security Online Essay1587 Words   |  7 PagesAmerica and Its Homeland Security Online Abstract: Everyday security is provided by the states and federal government. These tasks get more difficult as new technology introduces itself. Cybersecurity is one of the most popular security sectors in today’s world. There is not only cyberbullying going on in the world. Terrorism can be planned and sent from person to person over the internet. People’s identities are being stole to help carry out these terrorist acts and this is just the being of itRead MoreThe Threat Of Cyber Security1452 Words   |  6 PagesThe purpose of this briefing is to: †¢ Clarify the importance of cyber security in marketing †¢ Educate employees on the importance of cyber security in the workplace †¢ Explain to marketer why they are targets of cyber security attacks †¢ Educate employees on how they can prevent cyber attacks Informing and educating employees on why cyber-attacks are becoming more prevalent and how to identify and prevent them gives an organization ease of mind. A cyber breach or attack is inevitable, however mitigatingRead MoreThe Impact Of Stuxnet Worm On The World s Nuclear Facilities1340 Words   |  6 Pagesautomatically activates other copies of the worm on the same network, and it activates its rootkit, which allows it to hide its processes and activity on the local computer as well as the entire computer network. Kaspersky Lab, an international software security group operating in almost 200 countries and territories worldwide, concluded that the attack â€Å"is a one-of-a-kind, sophisticated malware attack backed by a well-funded, highly skilled attack team† and that the â€Å"attack could only be conducted withRead MoreInformation Is A Source Of Power In International Relations.967 Words   |  4 Pagesfunctioning of a state. However, when any state places enough impor tance on a resource of power, that resource becomes a target. An attack on informational structures of a state are cyber-attacks or â€Å"the use of computational technologies in cyberspace for malevolent and destructive purposes in order to impact, change, or modify diplomatic and military interactions between entities† Cyber-attacks are increasingly becoming daily security threats in both private and public sectors of a state. In 2016Read MoreCyber Threats931 Words   |  4 PagesTOP FIVE CYBER SECURITY THREATS FOR 2012 11 August 2012 ABSTRACT The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.