Cyber Security as the Process of Different Security Measures - Essay Example

Comments (0) Cite this document
Summary
This essay analyzes that Cyber Security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data. Cyber Security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Cyber Security as the Process of Different Security Measures
Read TextPreview

Extract of sample "Cyber Security as the Process of Different Security Measures"

Download file to see previous pages National security, economic vitality, and daily life of individuals vastly depend on safe, resilient, and stable cyberspace. Cyber Security is a global concern because cyberspace is increasingly becoming a crucial asset to nations. However, few countries possess an arguably secure digital infrastructure – the United States no exception (Singer & Friedman, 2014). The Department of Homeland Security, for instance, is committed to improving its cyber networks and infrastructure, as well as cyber security across all key information sectors. Meanwhile, cyber attacks and intrusions have increased significantly over the last two decades, disrupting critical operations, exposing sensitive business and personal information, and imposing exorbitant costs on economies. As a result, countries must make significant advances in securing their systems from potential state-sponsored operations and intrusions and growing threat of cybercrime (Singer & Friedman, 2014, pp67). Overall, contemporary organizations must adhere to the conventional cybersecurity standards to curb cybersecurity attacks and enhance safe security techniques.
The reasons and motivations for violations of computer security vary between hackers/crackers. For instance, some hackers are extremely skilled and vastly motivated with the goal or objective of compromising the computers of an organization for espionage or financial gain (Reveron, 2013, pp56). Other hackers are simply vandals and thrill-seekers, commonly involved or responsible for ruining websites and web pages. In most cases, attackers deface websites to make the political statement.
Furthermore, multiple cyber-crimes that occurred in the last decade targeted both private companies and government agencies. For instance, commercial websites such as Amazon.com, Yahoo.com, CNN.com, eBay.com, and Buy.com hit colossal DOS in the year 2000. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Security as the Process of Different Security Measures Essay”, n.d.)
Cyber Security as the Process of Different Security Measures Essay. Retrieved from https://studentshare.org/information-technology/1672935-literature-survey-about-any-security-subject
(Cyber Security As the Process of Different Security Measures Essay)
Cyber Security As the Process of Different Security Measures Essay. https://studentshare.org/information-technology/1672935-literature-survey-about-any-security-subject.
“Cyber Security As the Process of Different Security Measures Essay”, n.d. https://studentshare.org/information-technology/1672935-literature-survey-about-any-security-subject.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Security as the Process of Different Security Measures

Cyber Security

...or intricate measure would be taken to implement security measures to protect your own self. Beginning from plain malicious codes or malware to grave viruses which can erase all the data on your computers or gulp all the contents of your windows; hackers can utilize your personal data for their deceitful purposes. These are risks that if not properly addressed can create acute problems for you. (Cyber Security (2010)) Often these malicious codes or spyware get into your computer when you enter a new website or open an unknown mail. Every application has some loop holes which are identified by hackers and then it becomes easier for them to exploit your...
10 Pages(2500 words)Coursework

Information warfare and cyber security

...corporation business programs. The firms should bring in technical experts capable of handling cyber warfare and implement stringent IT security processes to create secure work environment. The best way to tackle cybercrime is to be aware, and prepared for all kinds of contingencies, and to constantly update and upgrade infrastructural defense tools like firewalls, to block any potential virus or bugs from corrupting the network system. Cyber warfare technical and economic defense measures Technical: There are different technical defense measures that are applicable to circumvent...
40 Pages(10000 words)Research Paper

Cyber security

...? Cyber Security Topic Cultural values as viewed in the static sense represent the heritage and traditional norms that govern behavior in society. However, in the dynamic state it represents contemporary beliefs expressed modes through ideas, creativity in thought and actions. Hence, it is true to state that cultural values are the building blocks for social morality. Consequently, these cultural values are what instill the moral responsibility within a person to engage in a certain behavior. Furthermore, by extension, the same behaviors instigated by our cultural values are what impact on cyber ethics. An example of how cultural values impact on the moral legitimacy can be drawn on the...
3 Pages(750 words)Coursework

Cyber security

...? Cyber Security Organizational business mission and related security goals Intellectual property is a juridical concept that refers to creative formations of the mind that have exclusive rights. Owners of the creations are granted exclusive rights on intangible assets as stipulated in the intellectual property law on intangible creations such as music, works of art, inventions, designs, symbols and innovations. Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the issues pertaining to intellectual...
4 Pages(1000 words)Coursework

Cyber security

...are accessed is an indication that digital storage should be carefully executed. More than one person should have passwords that permit accessibility of files. This can save time wastage when one person who has the password is sick, on vacation or is dead. Individuals with the passwords should be known so that any breach or leakage should be traced to the one responsible. In as much as several governments are trying to come up with e-government systems that have user friendly and basic graphical interface, they should put up measures that ensure that information security is maintained. They should not only focus on minimizing the costs of data storage. They should lay emphasis on data privacy and...
2 Pages(500 words)Coursework

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework

Cyber Security

...Insert Introduction The world today is more interconnected than ever before. As many people become more dependent on modern technology, there has equally been an emergence of vulnerability to cyber attack such as security breaches, spear phishing and social media fraud. With all its advantages, increased connectivity means increased risk incidences involving theft, abuse and fraud. Ensuring cyber security is the role of every individual as it’s everyone’s duty to ensure it is safer, more secure and resilient (Marshall, 67). Cyber security refers to the body of technologies, processes and practices...
1 Pages(250 words)Essay

Cyber Security

...their portal but still sometime they are not in a position to maintain 100% security. Like the banking authorities, common people also need to maintain knowledge on every transaction of their account. Security measures include the frequent change of passwords. Dragon (2012) in his analysis has mentioned few points, which in his opinion need to follow by the common people to protect their banking accounts as well as various banking transaction process. Bank account owners need to pay attention be financially diligent and making frequent bank inquiries. Bank authorities need to link the information of the login details (Dragon, 2012). Moral issues With increasing threat...
10 Pages(2500 words)Term Paper

Recommendation letter

1 Pages(250 words)Essay

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as infected while...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cyber Security as the Process of Different Security Measures for FREE!

Contact Us