StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Primary Cyber Threats - Coursework Example

Cite this document
Summary
This research 'Primary Cyber Threats' has been conducted to explore the latest cyber threats an airport bears and all the issues in an airport’s infrastructure which is equally valuable for the existing, new, and future clients and passengers. In the security system against cyber threats, a company usually determines its target…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Primary Cyber Threats
Read Text Preview

Extract of sample "Primary Cyber Threats"

   Operational systems are those systems of a company that monitor the internal infrastructure of that organization and also control its workings. These systems include some SCADA systems or DCS which are commonly known as the Distributed Control System (Bodeau, et al, 2010). There are many examples of users of such systems in the entire world and we can easily find them which have control generation plants and some computer systems to protect their internal infrastructure of the management of their operations (PWC, 2010). These systems are important for each company as these are the systems that are developed by the most efficient engineers and they use them to handle all these systems to confirm the security. Companies can easily start checking their security systems by accessing their entire security posture with the help of SCADA and DCS devices and can control the drawback drawbacks system to prevent any cyber-attack by making some frameworks such as ITIL or COBIT (PWC, 2010).
  

Most people prefer air travel because of its easiness and provided services along with the less consumption of time. But after the case of 9/11, airports were a lot under pressure to strengthen their internal security systems for preventing such threats in the near or far future especially in the USA. It becomes a basic need for protecting peoples ‘lives and nations’ assets. In late 2001, after the awful incident of 9/11, the Transportation Security Administration (TSA) was established and charged with the safety of travel within the United States (Swafford, 2011).

In my opinion, the only most manifest part of airport security can be the use of full-body scanners. (Swafford, 2011)

Advantages and Disadvantages of different security systems against Cyber Attacks

Biometrics and Access Control

It is an elementary system which uses to control and save the unique feature of one’s body such as fingerprints. Airport authorities use to make a file of each of their passengers and save them so that in case of any criminal act they could gather the data (Wees, 2012).

Passenger screening

It is an internal control system that helps the airport authority to keep an eye on the passengers about their arrival and existence. They monitor the screen from the control room. An example of such a system is the CUPPS system. But after the incident of 9/11, these systems have been considered as effective tools to control the security within the airport. As transportation to give ease to the people, not the death and threats at all times, so passenger screening is essential (Wees, 2012).

Baggage tracking and inspection

It is a commonly used system, and most organizations are using a Baggage handling System which is also known as BHS. This system is used to track and scan the bags of passengers to confirm the security and lesser threats (Wees, 2012).

Networks and Web Services

In the security system against cyber threats, a company usually determines its target and policies which includes the latest and more advanced persistent threat. As transport is something to give ease to the people, not the death and threats all the time. Networking and web services are some of those systems which can help airports in controlling their internal infrastructure to protect their stakeholders and passenger from any kind of cyber-attack (Wees, 2012).

Conclusion and discussion

At the Airports, security is the basic key element, and it is not an easy job to do most omnisciently and accurately and each security system always require many great deals of investment it to develop best computerized, most proficient and advanced security system with the help of both, people and infrastructure. These systems are important for each company as these are the systems which orthotope by the most efficient engineers and they use to handle all these systems into firm the security. IT is the backbone of any internal infrastructure as IT plays such a large role in modern day modern-day the following actions are vital:

  • Physical facility security must strengthen.
  • Employees must perform above reproach.
  • IT infrastructure must implement restricted access, employ environmental controls, and account for redundancy and secondary power options (PWC, 2010).
Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Objective: Assess the primary cyber threats to an organization's Coursework”, n.d.)
Objective: Assess the primary cyber threats to an organization's Coursework. Retrieved from https://studentshare.org/information-technology/1459190-objective-assess-the-primary-cyber-threats-to-an
(Objective: Assess the Primary Cyber Threats to an organization'S Coursework)
Objective: Assess the Primary Cyber Threats to an organization'S Coursework. https://studentshare.org/information-technology/1459190-objective-assess-the-primary-cyber-threats-to-an.
“Objective: Assess the Primary Cyber Threats to an organization'S Coursework”, n.d. https://studentshare.org/information-technology/1459190-objective-assess-the-primary-cyber-threats-to-an.
  • Cited: 0 times

CHECK THESE SAMPLES OF Primary Cyber Threats

The Doctrine of Cyber Law, its Effectiveness and Reliability

The paper "The Doctrine of cyber Law, its Effectiveness and Reliability" affirms that a huge number of cyber laws is an effective deterrent of cyber crime and results in a large no of prosecutions.... Thus, the question arises: Is cyber law really effective in stopping crime?... It includes crimes like hacking, pornography, crimes related to online financial transactions, credit card frauds, email hijacking, cyber sabotage, virus attacks, etc....
6 Pages (1500 words) Research Paper

Cyber Crime as opposed to Cyber warfare

The paper entitled "cyber Crime, as opposed to cyber warfare", concerns cyber crimes.... Problem Statement Although systems and software developing IT organisations (such as Microsoft, Apple, IBM) have been striving to deal with the rising menace of cyber crime, there is dire need to develop strong anti-virus software's to ensure information security.... Nevertheless, cyber crimes (specifically viruses) do not only threaten security of software components, but also they may sabotage hardware resources, especially computer hard disks....
11 Pages (2750 words) Research Paper

Threats to Mobile Phone Users Privacy

This report "threats to Mobile Phone Users' Privacy" discusses significant cybersecurity vulnerabilities and related threats associated with mobile computing for the users.... Significant Cyber Security Vulnerability and Associated threats in Mobile Computing From the previous two eras the status and significance of laptops and notebooks have been increasing day-by-day.... When laptops are kept open as well as unattended, the physical vulnerability can occur as different relevant data becomes exposed to threats and network access can be done by others using the device....
9 Pages (2250 words) Report

Avoiding Cyber Threats in E-Commerce

The paper "Avoiding cyber threats in E-Commerce" provides a deep insight into measures available to prevent cyber-attacks - intrusion detection prevention systems, firewalls, encryption, anti-virus software, and login passwords, and programs for enhancing consumers' awareness of security.... Business organizations face millions of cyber attacks daily.... hesis statement: e-commerce is safe from cyber-attacks because it has sufficient mechanisms to defend critical attacks and respond to any cyber-attacks....
6 Pages (1500 words) Essay

Cyber Security as the Process of Different Security Measures

This essay analyzes that cyber Security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data.... cyber Security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops.... cyber Security is a global concern because cyberspace is increasingly becoming a crucial asset to nations.... cyber Security is a global concern because cyberspace is increasingly becoming a crucial asset to nations....
6 Pages (1500 words) Essay

The US Department of Homeland Security

In recent times, more usage of computers and social media has certainly gauged cyber threats,.... According to Obama, the role of cyber security and the Department of Homeland Security (DHS) is to improve the infrastructure of the framework of cyber security by transferring the required information related to the protection of cyber threats and following proper guidelines as well as rules (Waltzman, Giancarlo and Webb 1-4).... his research paper intends to explain the responsibility of securing the nations and determine the infrastructure of cyberspace that can restrict in facing cyber threats or attacks on business and governmental policies....
9 Pages (2250 words) Research Paper

The Cyber Threats in Saint Louis County

The paper "The cyber threats in Saint Louis County" discusses that the development of information technology has been driving the world towards becoming more digitalization.... The digitalization of the world has led towards the emergence of the new and potential threat of cyber-war.... This provision must abandon the restrictive laws binding agencies involved in investigating cyber-crime so that they are able to carry out internet spying and are empowered to spy cybercrimes easily....
9 Pages (2250 words) Case Study

Threat Posed by Cyber Crimes to Homeland Security

The department of homeland security is tasked with the role of countering cyber threats and maintaining cybersecurity (DHS, 2010).... According to the department of homeland security, cyber threats are any efforts that lead to access to, manipulation, and the impairment of confidentiality, security, or availability of data (DHS, 2010), Cybercrime refers to offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly (Kruse & Heiser, 2002)....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us