Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Cyber Security Issues - Report Example

Comments (0) Cite this document
This report "Cyber Security Issues" presents cyber attacks that have often been individuals, corporate institutions, and in worse cases, governmental institutions. Perhaps not much has been done to track down the prevailing situation because of the nature of IT systems used by culprits…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Cyber Security Issues
Read Text Preview

Extract of sample "Cyber Security Issues"

Download file to see previous pages A modern phenomenon that is fast growing among attackers is what is referred to as blended threats. With this, attackers combine the characteristics of different components of IT threats including viruses, malicious code, worms with the server, client-side, and internet vulnerabilities to launch various attacks. Subsequently, because victims are not able to trace the origins of the attacks to a single source, it becomes difficult to control the rapid spread and widespread damage that is caused by the attack launch. It is in line with this that Orrey (2011) notes that with multiple and differing attack vectors, chances are always higher that attackers will succeed.

A major contributing factor to the sophisticating growth of cyber-attacks has to do with the corresponding growth of the internet and information communication systems. Among individuals, corporate bodies, and governmental institutions, the use of the internet and information community systems have almost become a necessary evil that they cannot do without. Meanwhile, these have also acted as the very media through which the spread of cyber attacks take place. It is not surprising therefore that the commonest forms of attacks available are those that have to do with internet-based malwares, viruses, botnets, denial-of-service, Trojan horses, and worms. What is more worrying is the fact that the levels of risks associated with these attacks increase with the scope of the affected entity. For example at the individual level, the threat may not be deemed as very harmful but at the corporate and governmental levels where network services are used, a greater quantum of harm are done infrastructures.

For any identified threat, there is no denying the fact that the best approach to dealing with it is a corresponding security solution but in today’s diversifying computer system, this approach has been difficult and in some cases, lacking. The reason for this could be because of the fact that the business environment operates its computer systems through different applications such as e-mails, electronic commerce, database and so on. So an attempt to have an all-round security solution is always hampered with the fact that different institutions would have different security needs. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
(Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 words, n.d.)
Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 words.
(Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 Words)
Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 Words.
“Cyber Security Issues Report Example | Topics and Well Written Essays - 9500 Words”.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Security Issues

Cyber Security

...Cyber Security Issues... Cyber Security Issues... Cyber security 02-02 Cyber security According to, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by internet, cyber space, cell phones and computers. However as we marvel our lives due to these technologies and feel ...
10 Pages (2500 words) Coursework

Cyber security

...Cyber Security Issues... Cyber Security Issues... Cyber Security Topic Cultural values as viewed in the static sense represent the heritage and traditional norms that govern behavior in society. However, in the dynamic state it represents contemporary beliefs expressed modes through ideas, creativity in thought and actions. Hence, it is true to state that cultural values are the building blocks for social morality. Consequently, these cultural values are what instill the moral responsibility within a person to engage in a certain behavior. Furthermore, by extension, the same behaviors instigated by our cultural values are what impact on cyber ethics. An example of how cultural values impact on the moral legitimacy can be drawn on the norms...
3 Pages (750 words) Coursework

Cyber security

...Cyber Security Issues... Cyber Security Issues... Cyber Security Organizational business mission and related security goals Intellectual property is a juridical concept that refers to creative formations of the mind that have exclusive rights. Owners of the creations are granted exclusive rights on intangible assets as stipulated in the intellectual property law on intangible creations such as music, works of art, inventions, designs, symbols and innovations. Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the issues pertaining to intellectual property...
4 Pages (1000 words) Coursework

Cyber security

...Cyber Security Issues... Cyber Security Issues... SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when digital data storage is used. The fact that digital storage can cause delays when authori...
2 Pages (500 words) Coursework

Cyber security

...Cyber Security Issues... Cyber Security Issues... Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with the risks out of need. In this scen...
1 Pages (250 words) Coursework

Cyber Security, Cyber Crime and Cyber Forensic

...Cyber Security Issues... Cyber Security Issues... Role of Federal Agencies in Fighting Digital Crimes Question 1 TheUnited States of America among other developed countries are facing escalating war against cybercrimes. The safety of the nation on digital basis entirely depends on the competence and devotion of the Federal agencies in the country. The agencies performance is not however a walk in the park since its success is barred by a number of retarding factor that include: inadequate supply of essential equipment, insufficient training facilities for its personnel and obtaining of essential resource may involve long procedure thus compromising service delivery. Curbing digital crime can be overwhelming if the agencies involved do not acquir...
2 Pages (500 words) Assignment

Cyber Security

...Cyber Security Issues... Cyber Security Issues... Introduction The world today is more interconnected than ever before. As many people become more dependent on modern technology, there has equally been an emergence of vulnerability to cyber attack such as security breaches, spear phishing and social media fraud. With all its advantages, increased connectivity means increased risk incidences involving theft, abuse and fraud. Ensuring cyber security is the role of every individual as it’s everyone’s duty to ensure it is safer, more secure and resilient (Marshall, 67). Cyber security refers to the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a ...
1 Pages (250 words) Essay

Cyber Security

...Cyber Security Issues... Cyber Security Issues... Security Cyber Security Today, business and personal operations depend on computers and technology. With the innovation of internet and high levels of computer programming, organizations are dependent on computer programs to make their operation smoother, less time-consuming and error free. Various services like banking and finance, personal investment, clothing stores or any other electronic or non-electronic products access consumer by simply logging on to the internet. US President Barack Obama in mentioned in a speech “Technology is reshaping every aspect of our lives, and protecting our digital infrastructure from cyber threats is one of our highest security priorities” (Martin, 2013). With...
10 Pages (2500 words) Term Paper

Cyber Security

...Cyber Security Issues... Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as infected while they are not. If such antivirus are programmed to be dele...
1 Pages (250 words) Essay

The Problem of Cyber Security in North Korea and China

State cyberspace, for example, is global cyberspace because Cyberspace has no borders. Computer networks make a nation cyberspace global cyberspace. An individual in one side of the world can access information on the other side of the world. This aspect that a person from one end of the world can access information from far makes cyberspace a threat to the nation, organization or individual. The fact is that cyber attackers can launch cyber-attacks in a place far from the organization they are attacking (Schiller, 2010).
It is true that cybersecurity is a challenge need to be addressed by the government. In addition, cyber-attacks have increased in the last few years prompting the government and policymakers to look for way...
1 Pages (250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Report on topic Cyber Security Issues for FREE!

Contact Us