Friday, June 14, 2019

Cybersecurity Coursework Example | Topics and Well Written Essays - 2500 words

Cyber protective covering - Coursework ExampleThe paper throws light on cyberspace, a mine field for seekers of information. With every fundamental interaction with websites, there would be an increasing demand for personal information. Such have been used by malicious persons for their own gains. Air travel has been hard produce by cyber crime and cyber-security in airports has been a challenge with each passing day. The internet has been used for various purposes which include gathering, storage, processing and transfer of vast information amounts, which include sensitive and proprietary personal, transactional and business data. Organizations have heavily depended on computing device brasss for day-to-day businesses. Even as this capability has been relied more and more by various individuals and organizations, the internet has been plagued by threats of cyber-security. The information available in the internet has been used to create threats to operations of businesses and in dividuals. These threats evolve with the expansion of the internet and the risks that come with it occur to grow globally. The United States of America remain to be the hardest hit by cybercrime according to the report on internet crime by Bureau of justice Assistance. There is a wide range of cyber attacks. Insider threats form the core perpetrators in computer crimes. According to Vatis, insiders do not need a great care of knowledge about computer intrusions as they posses adequate knowledge on the systems which they attack which allows them to have unrestricted access to damage the system or to slip ones mind system data. ... ge about computer intrusions as they posses adequate knowledge on the systems which they attack which allows them to have unrestricted access to damage the system or to steal system data (2002, p.3). Criminal groups have also increasingly used cyber intrusions for monetary gains. Vatis gives an example of such a group referred to as Phonemasters who wer e indicted for stealing and accessing federal interest computer and being in possession of access devices for which they were unlicenced. Virus writers also pose a great threat to security in IT. Viruses propagate quickly because of the high speed profits currently available. Anti-virus software available and being careful with attachments would go a long way in curtailing such epidemics. Other cyber attacks emanate from terrorists, hackers and information warfare. Vatis defines cyber attacks as computer-to-computer attacks carried out to steal, erase, or alter information or to destroy or impede the functionality of the target computer system (2002, p.10). These could be categorized into three, namely unauthorized intrusions where the attacker uses hacking techniques to break into a computer or unauthorized access by an insider to accomplish unauthorized tasks in the network destructive worms or viruses spread through computers using forms of data exchange such as emails causing some parts of the network to lose functionality and denial of service attacks where a computer would be overloaded with communication thus hampering its functionality. Due to the ever increasing critical business partners affiliated to customers and partners on the internet, many organizations have been left exposed to cyber attacks. There is no guarantee that malicious acts or intrusions would not happen. But aviation

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.