StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cybersecurity Techniques - Coursework Example

Cite this document
Summary
The paper "Cybersecurity Techniques" focuses on the critical analysis of the major issues in cybersecurity techniques. There are three encryption techniques: asymmetric, symmetric, and hashing techniques. Asymmetric cryptography utilizes two keys…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Cybersecurity Techniques
Read Text Preview

Extract of sample "Cybersecurity Techniques"

This is because it is distinctive to a message, small changes to a message causes a different has, therefore, warning of interference.

Symmetric methods may be the most suitable for securing movie videos from unlawful viewing while kept on servers in the cloud. A sender may use a key to program a message into cipher text. The receiver may employ the identical key to decipher it. This will permit only individuals who have authorization to the movie videos to view them (Delfs & Knebl, 2007).

Yes. The American government can employ a cloud-based model to enhance its operations. This is because applications of cloud technology do not rely on on-site staff or agency servers. A cloud-based computing model is beneficial in several ways. One, it will reduce governmental costs. Payments are made incrementally. Two, the government can save more information than private systems. Third, government officials can access data from any place. Fourth, government agencies can collaborate and communicate efficiently (Rabkin & Zaharia, 2010).

The community cloud model should be utilized for inter-agency connections. This is because this model shares resources among several organizations from an area with mutual interests, for example, jurisdiction, compliance, and security, whether managed by a third party or internally and hosted outwardly or inwardly. The expenses are shared among fewer people than in a public cloud (Zittrain, 2008). Meaning, only certain cost savings abilities of cloud computing are fulfilled.

Hybrid Cloud should be utilized for the public-private partnership critical infrastructure. A hybrid cloud entails a blend of a private and public cloud that work together, but remain sole units. This provides the advantage of numerous deployment models. Public-private partnerships can get levels of locally immediate usability and fault tolerance without depending on the connectivity of the internet when they use a hybrid cloud for their critical infrastructure (Tucker, 2004). In the hybrid cloud model users subcontract significant information and giving out to the public cloud, while maintaining essential services and data under their control.

A study conducted by the seventh annual Business Software Alliance indicates that the degree of world software piracy in 2009, increased to forty-three percent. This was a two percent increase since 2008 (Vacca, 2009). The statement means software piracy levels are tremendous in other parts save for America due to differences in the stated areas. The US has stronger copyright laws; enforcement agencies, and ease of enforcing domestic standards internationally, and its people hold a stronger economic position than many nations. For example, the Stop Online Piracy Act advocates for criminal indictment for illegal media streaming (Reilly, 2003). Conversely, there may be no laws against illegal media streaming in a country, in Africa. The above factors lower software piracy levels in America than in other countries (Lee, 1999).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 500 words - 7”, n.d.)
Cybersecurity Coursework Example | Topics and Well Written Essays - 500 words - 7. Retrieved from https://studentshare.org/information-technology/1608635-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 500 Words - 7)
Cybersecurity Coursework Example | Topics and Well Written Essays - 500 Words - 7. https://studentshare.org/information-technology/1608635-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 500 Words - 7”, n.d. https://studentshare.org/information-technology/1608635-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cybersecurity Techniques

Cybercrime: Law Enforcement and E-Government Transnational Issues

Key concepts affecting cybersecurity consist of attacker methods and incentives, malicious code techniques, threat vectors and exploitation trends.... This paper ''Law Enforcement and E-Government Transnational Issues'' discusses cybersecurity laws, regulations, and legal concepts applicable to managerial decision-making concerning industry, transnational crime, and government.... This research paper discusses cybersecurity laws, regulations, and legal concepts applicable to managerial decision making concerning industry, transnational crime, and government....
7 Pages (1750 words) Research Paper

Most Important Cybersecurity Vulnerability Facing IT Managers Today

According to the report with the developments in information technology field, there emerged a large number of useful techniques to support a wide variety of functions such as better online communication, data transfer, business, marketing, management.... These tools and techniques have provided wonderful advantages for the business organizations....
9 Pages (2250 words) Term Paper

Cyber Attacks on America

Therefore, America is increasingly vulnerable to cyber-attacks which grow by breadth and complexity, indicating the need for the country to continuously adapt and re-engineer its protection approaches that would uphold its cybersecurity.... The review "Cyber Attacks on America" observes America's vulnerability to cyber-attacks has increased leading to loss of confidentiality, integrity, and availability....
10 Pages (2500 words) Literature review

Criminology in the Future

The current cyber forensic techniques used by the Federal Bureau of Investigation will remain prominent and of interest to the legislators (FBI, 2012).... Though the cybersecurity Act of 2012 was not passed, it will remain needed.... Moreover, crimes and crime detection both evolve with technology (Schmalleger, 2012, Chapter 13)....
2 Pages (500 words) Essay

Law Enforcement and E-Government Transnational Issues

The author of the "Cybercrime: Law Enforcement and E-Government Transnational Issues" paper discuss cybersecurity laws, regulations, and legal concepts applicable to managerial decision making concerning the industry, transnational crime, and government.... Sensitive government information leaked from the WikiLeaks cables, an illustration of cybersecurity issues.... Issues that continue to challenge and thus calling for the United States' government cybersecurity intervention include the growing integration of mobile devices technology into perilous information infrastructure....
7 Pages (1750 words) Coursework

Critical Annotated Bibliography on Cybersecurity

Information security solutions are partial and subtle as simpler techniques of cyber security cannot provide a comprehensive solution to security flaws.... The author of this paper "Critical Annotated Bibliography on cybersecurity" discusses the literature concerning the problems of cybersecurity, criminal and fraudulent motivations, the security implications in information communication, critically analyzing the bibliography.... In the context of cybersecurity, the government of the US has focused on the seven crucial areas including risk management, incident management, privacy and information sharing, international engagement, supply chain security, research and development, innovation, education, and awareness....
6 Pages (1500 words) Annotated Bibliography

How Serious Are Cyber-Security Threats

The term is also referred to as information technology security that consists of the techniques used to protect computers, computer networks, programs along with data from attacks or unauthorized access that can be utilized for the exploitation of varied types.... This paper will delve into varied facets of cybersecurity and threats to bring forth the impact of this area concerning governmental and non-governmental areas, how these affect government relations internationally, varied cybersecurity breaches and analytical evaluation of breaches and their repercussions....
9 Pages (2250 words) Coursework

Effect of Decision Making in Cybersecurity

The paper "Effect of Decision Making in cybersecurity" describes that decisions adopted in any organization have a huge impact.... In the case of cybersecurity, the decision taken about the system and software to be used in the organization determines how secure or vulnerable it becomes.... Decisions of having the best systems and software strengthen cybersecurity and lower the chances of intruders.... The decision adopted by stakeholders at any given time about cybersecurity has a significant impact in the long run because they determine the measures they might take or those leading the IT department....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us