StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cybersecurity as a Metaphoric Abstraction - Coursework Example

Cite this document
Summary
The paper "Cybersecurity as a Metaphoric Abstraction" focuses on the critical analysis of the major issues in cybersecurity as a metaphoric abstraction. It has been used in both computing and philosophy to represent the world both in computer systems and on their networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Cybersecurity as a Metaphoric Abstraction
Read Text Preview

Extract of sample "Cybersecurity as a Metaphoric Abstraction"

Business managers appreciate cyberspace as a provider of a faster medium for communication in organizations. On the other hand, cyber security plays a critical role in ensuring that the organization’s systems and data remain safe against any malicious intent.

Software programs, particularly those that run, store, and retrieve data from databases remain vulnerable to cyber attacks. Aksoy and DeNardis (2008) define viruses as malicious codes which would be embedded in legitimate programs and get activated with the execution of the program. The authors further note that viruses would propagate from one computer to another. A Trojan horse refers to a virus dissembled in a legitimate program. For example, the Melissa virus known to have been spreading through the internet and which disabled networks was spread when a user opened an infected attachment which caused the virus to be emailed to 50 recipients in the user’s address book which created an exponential increase in the virus-infected messages. Erdbrink (2012) reports how countries such as Iran have spent massive resources on controlling and preventing viruses. Anti-virus programs combat these viruses and keep the system and network safe from virus attacks.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 250 words - 5”, n.d.)
Retrieved from https://studentshare.org/information-technology/1604386-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 250 Words - 5)
https://studentshare.org/information-technology/1604386-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 250 Words - 5”, n.d. https://studentshare.org/information-technology/1604386-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cybersecurity as a Metaphoric Abstraction

Metaphoric Comparison of Audi Manufacturing

According to the paper 'metaphoric Comparison of Audi Manufacturing', metaphoric demonstration of various processes and systems is a common evolution in literature ever since Aristotle's times.... The present context of the analytic study is based on the exploration of the luxury car manufacturing giant, Audi manufacturing, from three different metaphoric perspectives namely, organizations as machines, organizations as intricately woven meshes, and organizations as processes of flux and transformation....
14 Pages (3500 words) Essay

Description of Metaphor Components

"Description of Metaphor Components" paper describes the three components of metaphor such as topic, vehicle, and grounds explains the claim that metaphor is found in most writing very frequently, and illustrates with examples taken from the attached text about Jack Ashley.... .... ... ... A metaphor is a figure of speech that may be applied to an object to which there is no literal meaning....
13 Pages (3250 words) Essay

Metaphor in Korean and Arab Culture

Elements of these frames can have nothing in common, but creation of a new metaphoric derivative happens as follows: Figure 1.... Algorithm of a new metaphoric derivative creation Further considerations are about metaphors in Korean and Arab cultures.... Metaphor in Korean and Arab culture [Name] [Date] Abstract This paper deals with metaphor and its important role in languages and cultures of different nations....
4 Pages (1000 words) Essay

Considerations in Cybersecurity

cybersecurity 1.... The United States government has established a number of compliance measures aimed at preventing or reducing cyber-attacks ("cybersecurity assurance program," 2012).... In this way, Adagia Telecom had relatively lax cybersecurity measures in place.... Indeed, the Republican and Democratic parties have already established conflicting approaches to cybersecurity in their current Presidential platforms....
3 Pages (750 words) Coursework

Cybersecurity

This paper ''cybersecurity'' discusses the methods of government intervention while dealing with cyber threats, especially with regard to the laws that the government has set up.... The government works closely with the private sector to ensure that cybersecurity laws are implemented in various sectors.... This paper seeks to explore how the government can justify telling the private sector how to set up or improve their cybersecurity.... The paper also provides arguments for the intervention of the government in cybersecurity....
6 Pages (1500 words) Literature review

The Profound Metaphorical Implications of the Achilles Heel

The paper describes Achilles heel as one of the most common metaphors in modern English due to its universal acceptance and application as a metaphor for vulnerability; this metaphor has a much deeper interpretation that implies the strong losing guard.... ... ... ... Metaphors from all over the world share a number of commonalities, which technically comprise universality in metaphorical thought; for instance, metaphors are not only conceptual and linguistic, they are also neural, bodily, and social....
5 Pages (1250 words) Research Paper

Color Metaphor - What Color Represents in a Particular Culture

he comprehension of metaphoric usage in the language obviously 'affects our understanding of our conception of concepts.... The author of the paper "Color Metaphor - What Color Represents in a Particular Culture" will begin with the statement that color is the essence of our lives....
4 Pages (1000 words) Essay

Public Sector Cybersecurity Issues

The coursework "Public Sector cybersecurity Issues" describes the main aspects of cybersecurity.... This paper analyzes the effects of cybersecurity regulations on the American food industry and the public sector, goals of lawmakers in the public sector.... Established cybersecurity regulations have, however, affected the delivery of services in both sectors.... This paper will discuss private sector-public sector cybersecurity issues with a focus on the American food industry....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us