Free

Cybersecurity - Article Example

Comments (0) Cite this document
Summary
The writer deals with the tendency in human beings of obeying a person who has the authority without questioning (Cialdini). The author also highlights how one can use his or her authority or the authority of someone else in…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Cybersecurity
Read TextPreview

Extract of sample "Cybersecurity"

The Principle ity ity’ is one of the principles of Cialdini. The deals with the tendency in human beings of obeying a person who has the authority without questioning (Cialdini). The author also highlights how one can use his or her authority or the authority of someone else in order to influence others and suggests that one should be cautious of using his or her authority.
Two examples of the principle
1) The public’s inclination to obey the figure of authority can be seen by the way that young people follow the well-known figures in the film industry i.e. their trends or fashion. Different companies hire famous personalities from the film industry for the commercializing their products to increases sales of their products because the public loves to follow such celebrities.
2) The use of this principle can be seen in security forces, especially in the army where others follow the order of the person in authority without questioning.
How it can be used for good or for evil?
The principle of authority can be used for both good and evil. For instance, if a celebrity works for promoting awareness among people would be the beneficial-use of the authority he has. One of the recent examples is the participation of celebrities from the Indian film industry in the “Neat and Clean India” program initiated by the Indian Prime Minister Mr. Modi. The negative impact could be observed when individuals observe the person in authority smoking, and imitate him or her by adopting a bad habit
Why is this important for Cyber security?
The cyber security also follows one’s authority and laws about the security of cyber are also formed by the order of a person in authority. For instance, on February 12, 2013, President Obama, who has the highest level of authority in the US, announced a new legislation for the sake of cyber security, which is now in practice to protect the cyber from external attacks.
Works Cited
Cialdini, Robert. B. Influence: Science and Practice. Boston: Pearson, 2008. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Cybersecurity Article Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1676817-cybersecurity
(Cybersecurity Article Example | Topics and Well Written Essays - 250 Words)
Cybersecurity Article Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1676817-cybersecurity.
“Cybersecurity Article Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1676817-cybersecurity.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cybersecurity

Cybersecurity

...?CYBER-SECURITY Cyber-Security Affiliation Table of Contents Question No 3 Question No. 3 7 References 12 Question No Choose2 Symmetric Encryption Algorithms to compare and contrast. Discuss what they are, how they work, their advantages/disadvantages, and how/why it was created (did it have a problem or purpose it solved). For comparing two symmetric algorithms I have chosen Stream Ciphers and Block Ciphers Encryption Algorithms. Stream Ciphers is a symmetric encryption algorithm that encrypts the bits of data and information. Additionally, this type of encryption is performed on one bit at a time (or occasionally 1 byte at a time) of data at some particular time. In addition, the method of stream cipher is much quicker... Cyber-Security...
5 Pages(1250 words)Essay

Cybersecurity

...?Cybersecurity There are a number of considerations when comparing and contrasting the impact of cybercrime on businesses against traditional crime. The most obvious differentiating factor is the nature of the criminal activity, as in the case of cybercrime the criminals are able to generally evade a physical presence in the environment. Another prominent difference between traditional crime and cybercrime are the business industry’s knowledge and perspective on these issues. Bharra (2012) interviewed four major organizations and discovered that they were not even aware which branch of the Federal Bureau of Investigation (FBI) that should inform in case of a cyber-attack. There is the further consideration that while many...
3 Pages(750 words)Coursework

Cybersecurity

...from the Internet, internal networks, and/or other public systems as well as private systems (Schaeffer, Chan, Chan, & Ogulnick, 2009). Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile based device to any information system by utilizing a particular or a combination of varied data transfer methods. Portability is regarded as a key facet of mobile computing (International Association of Medical Science Educators, n.d.). This paper intends to provide a discussion about mobile computing. The discussion comprises recognizing the significant cybersecurity vulnerabilities and related threats associated with mobile computing for the users. The other...
8 Pages(2000 words)Coursework

Cybersecurity

...? Cyber security Table of Contents Table of Contents 2 Introduction 3 Brief of the Organizations and their Mission 3 Comparison and Contrast of Privacy Policies of Apple Inc., IBM and Microsoft 5 Possible Changes To The Policies For Customer Protection 8 Possible Changes to the Policies to Give More Flexibility to Use Personal Information of Customers 9 References 12 Introduction Privacy policy is fundamentally viewed to be a legal statement or a document that manages and handles precious information of a client or a customer. The privacy policies are often used in various sectors with the intention of safeguarding different valuable information or data of the clients. This particular aspect i.e. privacy policy is much crucial... Cyber...
7 Pages(1750 words)Coursework

Cybersecurity

...? CrypTool Labs 2 (School) This particular report will include the responses to the questions regarding the first two labs that utilize the CrypTool software. Keywords: CrypTool, analysis, software, cryptography, labs Lab Part 1: Introduction to Cryptography Using CrypTool Q1. Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why? The text used for the purpose of this lab is the first few paragraphs of Douglas Adam’s Hitchhiker’s Guide to the Galaxy, along with additional text stating this is where the sample text was pulled from. The N-gram list of Caesar encryption of the document itself would be the most effective... CrypTool Labs 2...
4 Pages(1000 words)Coursework

Cybersecurity

... Question 3 Vulnerability is a fault in a system that an attacker/hacker uses to reduce the security of the information inthe system. Microsoft XP is known to be vulnerable to several threats; some of them include the following: Microsoft windows XP do not allot adequate memory for SMTP control replies hence allowing hackers to be able to read parts of e-mail messages through the use STARTTL commands. This is known as SMTP memory allowance vulnerability. (Vetterling, 2002) Windows XP is vulnerable in HTTP services where an attacker who notices this flaw can win an absolute control of computer system and be able to manipulate the already installed programs and do any other thing to the system with full user rights. Argument... Question 3...
1 Pages(250 words)Coursework

Cybersecurity

...the virus to be emailed to 50 recipients in the user’s address book which created an exponential increase in the virus-infected messages. Erdbrink (2012) reports how countries such as Iran have spent massive resources in controlling and preventing viruses. Anti-virus programs combat these viruses and keep the system and network safe from virus attacks. References Aksoy, P. & DeNardis, L. (2008). Information Technology in Theory. Canada, UK: Thomas Learning Inc. Erdbrink, T. (2012, May 29). Iran confirms attack by virus that collects information. The New York Times. Retrieved 2 October 2012 from www.nytimes.com Ivanova, P. (2006). Cybercrime and cybersecurity. International Journal of Information and Security, 18, 5 –...
1 Pages(250 words)Coursework

Cybersecurity

...Cybersecurity Your Topic 3 - Some mental health and criminal justice professionals contend that hacking is an"addiction," and causes obsessive, risk taking behavior in a manner similar to illegal narcotics - hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policymakers look towards treatment, rather than incarceration, as the disposition of hacker cases? Why or why not? The study conducted by Solmaz, Bell and Saygili (2011) is interesting. At first, after reading the article, there seems to be a dilemma between hacking as a form of addiction, which requires treatment to just simply being a criminal case. But going through further to their findings, it became clearer...
2 Pages(500 words)Coursework

Cybersecurity

...Cyber Security   Cyber Security Question There are three encryption techniques: asymmetric, symmetric, and hashing techniques. Asymmetric cryptography utilizes two keys, a public key and a private key to achieve encryption and decryption. In a symmetric cryptograph, the key employed to decrypt and encrypt information should be secured as anyone who can access it can interpret the coded message. Hashing produces a rare, fixed-length signature for a data set or message (Sinkov, 1966). Hashing encryption may be the most suitable for securing encrypted session in an online credit card shopping (Kahn, 1996). This is because it is distinctive to a message, small changes to a message causes a different has, therefore, warning... Security   Cyber...
2 Pages(500 words)Coursework

Cybersecurity

...Personal ment I am a highly motivated individual with an aim to transcend the boundaries of the cybernetics community. I have had experience in various areas involving Information Technology, but I believe that an individual never stops learning and thus I have endeavored to continue this process in a direction that will aid my overall ambitions. Since I was a young child, I have had a vivid interest in the workings of technology, and I found the computer to be a fascinating invention that I could not wait to explore. This fascination I admit played a large role in the path that I took in both my academic and career related journeys, and it remains a high motivation to this day. My academic objectives can be divided into two... ment I am a...
2 Pages(500 words)Personal Statement
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic Cybersecurity for FREE!

Contact Us