StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber Security Issues - Report Example

Cite this document
Summary
This report "Cyber Security Issues" presents cyber attacks that have often been individuals, corporate institutions, and in worse cases, governmental institutions. Perhaps not much has been done to track down the prevailing situation because of the nature of IT systems used by culprits…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Cyber Security Issues
Read Text Preview

Extract of sample "Cyber Security Issues"

Download file to see previous pages

A modern phenomenon that is fast growing among attackers is what is referred to as blended threats. With this, attackers combine the characteristics of different components of IT threats including viruses, malicious code, worms with the server, client-side, and internet vulnerabilities to launch various attacks. Subsequently, because victims are not able to trace the origins of the attacks to a single source, it becomes difficult to control the rapid spread and widespread damage that is caused by the attack launch.

It is in line with this that Orrey (2011) notes that with multiple and differing attack vectors, chances are always higher that attackers will succeed.A major contributing factor to the sophisticating growth of cyber-attacks has to do with the corresponding growth of the internet and information communication systems. Among individuals, corporate bodies, and governmental institutions, the use of the internet and information community systems have almost become a necessary evil that they cannot do without.

Meanwhile, these have also acted as the very media through which the spread of cyber attacks take place. It is not surprising therefore that the commonest forms of attacks available are those that have to do with internet-based malwares, viruses, botnets, denial-of-service, Trojan horses, and worms. What is more worrying is the fact that the levels of risks associated with these attacks increase with the scope of the affected entity. For example at the individual level, the threat may not be deemed as very harmful but at the corporate and governmental levels where network services are used, a greater quantum of harm are done infrastructures.

For any identified threat, there is no denying the fact that the best approach to dealing with it is a corresponding security solution but in today’s diversifying computer system, this approach has been difficult and in some cases, lacking. The reason for this could be because of the fact that the business environment operates its computer systems through different applications such as e-mails, electronic commerce, database and so on. So an attempt to have an all-round security solution is always hampered with the fact that different institutions would have different security needs.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 words, n.d.)
Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 words. https://studentshare.org/information-technology/1793592-cyber-security
(Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 Words)
Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 Words. https://studentshare.org/information-technology/1793592-cyber-security.
“Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 Words”. https://studentshare.org/information-technology/1793592-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Security Issues

Threats to Computer Security

This is because, the threats to computer security range from cyber crimes, to computer crimes and internet crimes, as well as computer privacy issues.... Computer security Grade Course (24th, Nov.... 2012) Computer security Computers have always been a major target for security threats.... Thus, the issue of computer security is very diverse such that it is not easy to cover.... hellip; The following are the major, recent computer security threats: Blended threats This refers to a combination of spyware and malware attacks on a computer....
3 Pages (750 words) Essay

Protocols and Policy to Secure Software

cyber security Standards Instructor Date TABLE OF CONTENTS Introduction 3 cyber security Standards 3 Popular Security Standards 5 ISO27002 5 NERC 6 Standard of Good Practice 6 Merits of cyber security Standards 7 Challenges of cyber security Standards 9 Unification of cyber security Standards 10 References 12 cyber security Standards Introduction The world has continued to develop at a fast rate when it comes to the development of new of new software and technology and this trend has seen the emergence of new models and software into the market that has served to improve the operations that take place in various sectors of business as well as everyday life (Vacca, 2009)....
8 Pages (2000 words) Essay

T. J. Maxx breach

The most infuriating and annoying part of the TJX Cyber Security Issues is that it could have been avoided because the way of encryption used for the wireless internet used by the company was an obsolete one (Stevens, 2010, p.... ?? Major characteristics of incident and losses of confidentiality, integrity, and availability The most infuriating and annoying part of the TJX Cyber Security Issues is that it could have been avoided because the way of encryption used for the wireless internet used by the company was an obsolete one (Stevens, 2010, p....
2 Pages (500 words) Research Paper

Cyber security

The answer has outlined the gains the government enjoys for employing technology to store its… This is a true reflection of what takes place when digital data storage is used. The fact that digital storage can cause delays when authorization is needed before cyber security cyber security E-government comes at a cost.... It is extremely essential that cyber security be considered a vital issue in a meeting of the United Nations.... Lastly, e-governments should discover new and advanced ways of maintaining cyber security....
2 Pages (500 words) Coursework

Managing Intelligence Activities

This paper will be useful to John Kerry; The United States Secretary of State to enhance his supervisory role on the effective performance of security agencies in combating insecurity challenges as it describes the principles of planning budget in this regard.... hellip; security is a very sensitive issue in every country and therefore invites the conservative approach by security agencies on the modalities of countering its imminent challenges....
1 Pages (250 words) Essay

The Problem of Cyber Security in North Korea and China

The paper presents cyber security as a twenty-first-century problem.... This follows a cyber-security breach that was witnessed recently by Sony Pictures Entertainment Inc.... cyber-attacks are also seen as a weapon used by states against other countries.... hellip; Cybersecurity is an emerging global challenge that has seen some states such as North Korea and China implicated in cyber-attacks.... cyber-attack is possible because of cyberspace, a situation where all computers globally are connected to the Internet....
1 Pages (250 words) Assignment

Module 1 Aviation Trend/Issue Report

ISIS supporters group hacked into the airport servers and posted images that… Grey (2015) presents some of the dangers that international airports face as a result of cyber attacks. From the interview, it is clear that every website has an equal probability to cyber security attacks.... From the interview, it is clear that every website has an equal probability to cyber security attacks.... Hacking Hobart: KPMG talk cyber security in Wake of IS airport attacks....
1 Pages (250 words) Essay

Cyber Chase Challenges

If anything, it is vast tracts of technology and systems security that have gasped to keep pace with the enterprise and ingenuity of the present-day cyber-criminal.... Zwienenberg, Chief Research Officer at security software vendor Norman Data Systems, recalled that in 1988 people were writing viruses and malware mostly to become famous.... The paper "cyber Chase Challenges" names malware writers and cybercriminals as the white ants of the internet era, eating into the foundations of our networks....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us