StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Scope and Kinds of Cyber Security - Research Paper Example

Cite this document
Summary
This research will begin with the statement that the modern times are characterized by the presence of computers and other digital devices. All around us we see the digital devices that have engulfed us. No office, no house or no vehicle can be spotted that does not make use of the technology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Scope and Kinds of Cyber Security
Read Text Preview

Extract of sample "Scope and Kinds of Cyber Security"

Download file to see previous pages

The researcher states that one can hardly imagine an activity that would not involve the computer and other digital equipment being used in digital devices. Their usage is furthermore visible in the organizational structures, both on managerial front, educational and governmental level. Having explained its dominance and presence all over in our surrounding, at the same time, it must be said that computing world which is an online world is a fragile one and is extremely vulnerable to the external threats and challenges.

These threats come in form of security concerns. While it is an outer world where there is no restriction on anyone who may want to join the network of World Wide Web, it becomes imperative to create a security factor consideration which would enable safe operations. Since all kinds of activities are being performed over the computer and internet, ranging from private data exchange to financial records, governmental records, other documents of national security, central databases and various other elements, in such cases it becomes important to establish a mechanism that would ensure safer operations on the internet.

Internet is being termed as one of the least equipped and least reliable source of communication when it comes to privacy and security. This has been proven in cases and forms of all kinds of breaches in different parts of the world from time to time. no bank, no individual, no organization , no website is safe from the attack of these insurgents who pose threat to the common flow of traffic across the board. Scope of cybersecurity: The scope of cybersecurity is a very large one and it finds its application in any place where there is computer and internet in function.

It would find its usage in home applications, official applications, educational institutes, governmental, even in the aeroplanes where most of the transmission is done over computer and digital means, require safe coding methods. Anything that is on the board of online interface is included in the scope of cybersecurity since it requires protection in one way or other. Even the domestic users of computer who may use it for ordinary online operations, require security and safety since any kind of malware or bug can penetrate into their computer and cause the desired damaged.

The need for cybersecurity: Cyberworld is just like the society of human being. While over 3 billion people from across the world are on board on the digital interface, it does require patrolling and controlling of the entire traffic. Just like the society would need law and order, police control and patrol, in the same way a medium that has over 3 billion users would require a scheme which would ensure safe usage of internet and computers. With all kinds of operations subject to the usage of online resources, it is highly imperative to create a zone that is shielded with secure browsing of computers and the world of internet.

Kinds of cybersecurity threats: Just like a physical society may face threats in different forms, the cyber world is no exception and it is faced with challenges and obstacles in various forms. These come in form of cybersecurity concerns.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Scope and Kinds of Cyber Security Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1404267-cyber-security
(Scope and Kinds of Cyber Security Research Paper)
https://studentshare.org/information-technology/1404267-cyber-security.
“Scope and Kinds of Cyber Security Research Paper”, n.d. https://studentshare.org/information-technology/1404267-cyber-security.
  • Cited: 1 times

CHECK THESE SAMPLES OF Scope and Kinds of Cyber Security

Information warfare and cyber security

cyber security  8 2Cyber terrorism 9 2.... hellip;   20 5Risk Involved in information warfare 23 6Safeguards from Attacks 26 Military approach to cyber warfare safeguard strategy 27 Governmental and industrial approach to cyber defense 31 Cyber warfare technical and economic defense measures 33 Technical: 33 Economic 34 7Disaster Recovery Planning  34 8Future of Information warfare and cyber security  36 9Conclusion 38 Bibliography 41   Abstract In the last few decades there has been a revolutionary change in the field of warfare, where computer has turned out be a major player....
40 Pages (10000 words) Research Paper

Future of Cyber Security

The paper "Future of cyber security " highlights that cyber-attack has become the most intrusive problem in life.... The outburst of cyber Assault The countries which are currently attacking the United States include China and Russia.... Additionally, for ensuring confidentiality and privacy in the informatics, it is exceedingly recommended that there should be a national level association to demeanor the in vogue studies and prepare reports on issues in the works at the crossroads of cyber attacks and privacy, society level suggested boards that would help speak to these issues from local or community perspectives....
6 Pages (1500 words) Essay

Bullying and Cyber-Bullying

Bullying has become a major concern for parents and school administration all over the world because children that are victimized by bullying have to go through severe mental trauma; and if they do not get appropriate help and intervention, they are likely to suffer from extreme… Therefore, it is imperative that adequate measures should be taken by the government, the school administration and the parents to counter bullying by duly intervening in such situations. To some It is quite possible that a number of parents remain unaware about the fact that their child is being bullied at school or in the neighborhood; as many children might not complain about being bullied....
12 Pages (3000 words) Research Paper

Cyber Security A Homeland Security Dilemma

The responses will be compared with the findings of the literature review and the research conducted in the past by authors on the subject of cyber security and the complex tasks of the Department of Homeland Security.... The worldwide web is an information system that involves a planet-wide scope and grid.... This paper investigates how can the Department of Homeland security effectively secure cyberspace from cyber attack, viruses, worms and other forms of malware....
9 Pages (2250 words) Research Paper

Cyber Security Policy Initiatives

The present paper under the title "cyber security Policy Initiatives" concerns the policy of cyber security.... hellip; The system of technologies, procedure, and observance which are structured for protecting networks, systems, applications and important information from attacks, harm or entrance from unauthorized as well as unrecognized sources is what is known as cyber security.... With the ever evolving cyber world, cyber security is of paramount importance....
11 Pages (2750 words) Research Paper

Cyber Criminals and Other Data Security Dangers

This paper “Cyber Criminals and Other Data security Dangers” gives a detailed overview of data safety odds by discussing true world examples.... The author popularizes the possibilities of ISO 27001 Information security Management Standard which aims to rectify and mitigate those threats.... hellip; There are numerous cases where IT managers have failed to provide or define adequate security for an enterprise-wide infrastructure of an organization....
16 Pages (4000 words) Term Paper

Department of Homeland Security and Its Role within Our Government

This research tells that homeland security is mainly challenged by terror threats.... hellip; According to the research findings, it can, therefore, be said that in the recent years, particularly after the events of 9/11, the global security paradigm changed completed and the level and nature of global and national security observed the rise of extremism and terrorism in the shape of the international terrorist organizations like Al-Qaida.... The researcher states that protecting the national boundaries, civilians and providing a sense of safety and security nationally, the Department of Homeland security (DHS) was established....
10 Pages (2500 words) Research Paper

Cyber Warfare as an Alarming Issue across the Globe

There are two kinds of cyber wars such as netwars where conflicts exist in internetted communication modes.... The other form of cyber warfare is third generation warfare.... This type of cyber warfare is based on information technology.... Network security is closely knitted with the concept of cyber warfare.... This paper is about a cyber warfare as an alarming issue across the globe.... Stuxnet is a cyber-warfare weapon....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us