StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Insecurity - Research Paper Example

Cite this document
Summary
The paper "Cyber Insecurity" states that unless pragmatic steps are taken to give total protection to users of the internet and other information systems against cyber insecurities, the interest that people have in using technology in advancing communication and commerce will bring down…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Cyber Insecurity
Read Text Preview

Extract of sample "Cyber Insecurity"

CYBER INSECURITYIf asked to give a single word that best describes the current state of global integration, it is very common that most people will mention globalization. In his article “Closing the global gaps”, Koduah (2009) contends that globalization is the use of technology to bring the borders of nations closer to each other and deprived of all forms of trans-border restrictions. Clearly, the definition given by Koduah implies that technology is a very instrumental phenomenon in breaking the gaps that existed between people and limited trade and other economic processes to take place.

In fact, as part of globalization and for that matter technology, communication and commerce have been more enhanced than they used to be before. But as much as we talk of the advantages of globalization, it is also important to have a look at what the repercussions of globalization and for that matter influx of technology has been on the larger population of the world. Cyber security is a term that is often used to represent the kind of protection given to personal information and digital documents.

In his article “Winning the fight against cyber crimes”, Lurrent (2012) argues that he need for cyber security has increased and become timely mainly because of increases of activities of illegal cyber operations. By this, reference is being made to the numerous acts of cyber attacks that are launched in the field of information systems. In the use of both personal and organized information systems, reports of information thief, virus attacks and other forms of information irregularities have been reported on a daily basis.

Some of these are so serious that they easily result people losing thousands of dollars especially when the bank details of users are tapped by cyber criminals. As much as these acts of cyber insecurity increase, there is the need for advanced countermeasures that can put the minds of end users at rest. In his article “Countermeasures for cyber security”, Deritck (2011) clearly states that unless pragmatic steps are taken to give total protection to users of the internet and other information systems against cyber insecurities of all forms, the interest that people have in using technology in advancing communication and commerce will bring down.

The various theses and arguments raised by the various writers whose works have been reviewed give the current writer much concern that there remains so much that needs to be done in the area of cyber insecurity if information systems can be used in transforming institutions, organizations and businesses. As a matter of fact, the importance of information systems in major institutions such as hospitals and other healthcare deliveries cannot be over emphasized as they make service deliver effective and efficient.

Should the fear of various forms of cyber insecurity therefore cause administrators and managers of these institutions to stop using information systems, the only implication is that the numerous benefits that are currently enjoyed will be cut short. It is in this regard that in his book “Succeeding against cyber crimes”, Lord (2012) argued that the time for action should be now or any again. CITED WORKS Deritck, Frank. Countermeasures for cyber security. Crber Insecurity Management. 2011.

Vol 21 No. 7Koduah, James. Closing the global gaps. Omega Press Series: London. 2009. Print.Lord, Abraham. Succeeding against cyber crimes. Amazing Press Limited: Texas. 2012. Print. Lurrent, Dorcas. Winning the fight against cyber crimes. Journal of International Cyber Securities. 2012. Vol. 3 No. 5.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“For the third essay, you are going to select an issue that you feel Research Paper”, n.d.)
For the third essay, you are going to select an issue that you feel Research Paper. Retrieved from https://studentshare.org/information-technology/1619496-for-the-third-essay-you-are-going-to-select-an-issue-that-you-feel-strongly-about-and-explain-why-you-feel-strongly-about-the-issue-this-essay-will-later-on-be-used-in-your-larger-research-paper-the-assignment-will-include-an-mla-outline-1-page-th
(For the Third Essay, You Are Going to Select an Issue That You Feel Research Paper)
For the Third Essay, You Are Going to Select an Issue That You Feel Research Paper. https://studentshare.org/information-technology/1619496-for-the-third-essay-you-are-going-to-select-an-issue-that-you-feel-strongly-about-and-explain-why-you-feel-strongly-about-the-issue-this-essay-will-later-on-be-used-in-your-larger-research-paper-the-assignment-will-include-an-mla-outline-1-page-th.
“For the Third Essay, You Are Going to Select an Issue That You Feel Research Paper”, n.d. https://studentshare.org/information-technology/1619496-for-the-third-essay-you-are-going-to-select-an-issue-that-you-feel-strongly-about-and-explain-why-you-feel-strongly-about-the-issue-this-essay-will-later-on-be-used-in-your-larger-research-paper-the-assignment-will-include-an-mla-outline-1-page-th.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Insecurity

Overview and History of the Dam Sector

The sector through guiding and fostering research in implementation and development of enhancing technologies and proactive measures will make sure that there are continued enjoyment and economic use of this resource via risk management framework that addresses recovery, mitigation, and response (Critical Infrastructure Partnership Advisory Council, 2011) Challenges The challenges that are inherent in the sector are:The poor condition of the infrastructure Cyber Insecurity due to information sharing Having constraints in the funding of the project ...
1 Pages (250 words) Assignment

Problem statement

Efforts continue to be put in by the computer security experts including state institutions such as the Bureau… But it remains open secret that most of the interventions being put into the fight of Cyber Insecurity has failed because of how sophisticated cyber Information Security Problem ment INFORMATION SECURITY PROBLEM MENT The problem of cybercrime continues to be an issue in network security, drawing back the trust that several clients have to engage in electronic commerce transactions....
1 Pages (250 words) Research Proposal

Memo to Users of Mobile Devices and Computers

It is as a result of the increase of cyber-attacks that Verizon Enterprise Solutions came up with Verizon Data Breach Investigation Report to provide solutions to Cyber Insecurity (“The Verizon Enterprise Solutions”).... The technical information provided by the report is solid because it addresses current cybercrime issues as well as provides solutions to the insecurity....
1 Pages (250 words) Essay

Internet Service Providers Protection and Cyber Crimes

The paper "Internet Service Providers Protection and cyber Crimes" presents the problem of illegal distribution of copyrighted material by ISP subscribers.... cyber pornography is a significant problem among young people and its happening due to the availability of materials all over the internet....
6 Pages (1500 words) Essay

Do You Think Internet Security Is a Threat to Developing Countries

"Do You Think Internet Security Is a Threat to Developing Countries" paper argues that developing nations need to take key measures in the use of ICT and technology to enable users (organization, youth, and adults) to navigate and browse through the internet without fear of insecurity.... he fact that some governments cannot allow certain transactions to occur online means that the systems been used are still vulnerable to insecurity.... Past research by Kallista and Oostdijk indicates that ICT governance and infrastructure, identity management systems besides weak systems and insecurity awareness are still poor in these countries....
6 Pages (1500 words) Research Paper

Argos Management

This essay "Argos Management" focuses on the crucial importance of reaching consensus with the organization (Argos) for the project's aim, strategy and plan.... nbsp;In an organizational or business setting, it helps in the delivery of products and in the understanding of the climate of the market....
7 Pages (1750 words) Essay

National Risk Register for India

… 1.... Fault Tree Analysis (FTA)16Figure 2: Fault tree analysis of risks affecting India161.... Action Plan for the Risks181.... Conclusion19The Government of India, (2016).... Environment Protection, Ministry of Environment, Forest andClimate change obtained 1.... Fault Tree Analysis (FTA)16Figure 2: Fault tree analysis of risks affecting India161....
13 Pages (3250 words) Assignment

Importance of Security in Cyberspace

There are limitations and drawbacks that have resulted from cyber-attacks both to individuals and also to organizations.... The application of cyber-security measures also helps in keeping the devices used in the IT departments safe from both hardware and software damages.... In the long run, all these measures help the users prevent unexpected losses that come along with rectification of the damages and losses caused by cyber-attacks.... cyber-security, also referred to as information technology, focuses more on protecting personal computers, networks, programs, and data from unauthorized access, alteration, or loss....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us