How Serious Are Cyber-Security Threats - Coursework Example

Comments (0) Cite this document
This paper will delve into varied facets of cybersecurity and threats to bring forth the impact of this area concerning governmental and non-governmental areas, how these affect government relations internationally, varied cybersecurity breaches and analytical evaluation of breaches and their repercussions…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful

Extract of sample "How Serious Are Cyber-Security Threats"

Download file to see previous pages Instances regarding cybersecurity threats have broad-ranging impacts. The paper provides a look at governmental and non-governmental examples. In the private sector, cybersecurity threats can be aimed at the financial sector. There is also industrial espionage and other instances. In the private sector, the most common threats represent compiling individual account information for identity theft as well as attacks on banks (Choo, 2011). The types of private-sector cybersecurity threats are varied, with financial gain representing the prevalent type, however, industrial espionage is also a highly active area. From the standpoint of comparison, cybersecurity breaches and intrusions in the governmental and non-governmental sectors have similar undercurrents, to obtain access to data that can be used for intelligence, information and competitive gains (Pawlak and Wendling, 2013). In terms of governments, the reasons are more complex and diverse. Broadhurst et al (2014), as well as Abomhara (2015) and other sources,  state there is a broad range of reasons why governments engage in cybersecurity intrusion. Abomhara (2015) advises that gaining access to the systems of other governments can represent a source of national security. This examination does not make a distinction in terms of sides (the United States, European, Chinese, Russian, Iran, etc.) since this is not a political analysis. As an example, the United States Intelligence Community represents a federation of sixteen separate government agencies that undertake intelligence activities in support of national security and foreign policy (Richelson, 2015). The Federal Security Service of the Russian Federation in the US counterpart that conducts counterintelligence, surveillance, state policy and allied activities (Taylor, 2011). In China it is the Ministry of State Security (Lu, 2018), the Ministry of Intelligence in Iran is another example (Nader, 2010), and in the UK it is MI5 as well as the Office for Security and Counter-Terrorism along with other agencies (Miller and Sabir, 2012). Every government has these types of agencies. Some, as can be deduced, are larger and better financed than others. These agencies conduct varied activities that are shielded from public scrutiny since there are varied threats such as military secrets, information gathering and other areas that are useful in gaining an intelligence advantage (Wilensky, 2015). As a result, governments (US, Russia, China, UK, Japan, etc.) have always carried out activities to collect information (Amoroso, 2012). This can represent military weapons, spy activities, the status of their information-gathering activities (Sigholm and Bank, 2013), as well as potential currency manipulation such as China’s activities as reported in Forbes Magazine that represents billions in trade advantages due to pricing (Mauldin, 2017). As brought forth in the prior segment, there are varied reasons why governments engage in cybersecurity activities. Global international relations, geopolitical aspects, industrial competitiveness and its importance to national economies, regional natural resources, terrorism, and other areas represent segments of a very broad sphere of involvement. A key example represents the activities of U.S. citizen Edward Snowden, a computer professional who had worked for the Central Intelligence Agency and who also was a former contractor to varied agencies. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(How Serious Are Cyber-Security Threats Coursework, n.d.)
How Serious Are Cyber-Security Threats Coursework. Retrieved from
(How Serious Are Cyber-Security Threats Coursework)
How Serious Are Cyber-Security Threats Coursework.
“How Serious Are Cyber-Security Threats Coursework”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF How Serious Are Cyber-Security Threats

Cyber Security

...? Cyber security 02-02 Cyber security According to, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by internet,...
10 Pages(2500 words)Coursework

Aviation Cyber Threats

...? Full Paper Aviation Security After September terrorist attacks, developed countries have significantly changed the way of countering vulnerabilities from terrorism. Enormous amount of resources were utilized for mobilizing them on a very short time period. These mobilized resources were aligned to counter apparent cyber threats from terrorist attacks. Likewise, in the entire hoax, there was a requirement of evaluating homeland security that also pertains to Information technology infrastructure. The Information technology infrastructure was not the only consideration, as these attacks affect vulnerabilities pertaining to federal information systems and any organization...
12 Pages(3000 words)Essay

Cyber Threats

...? Cyber threats Number: Lecturer: Introduction With cybercrime becoming a threat to many organizations, there are many threats that have been recognized and pose to be a threat to the normal operations of an organization. There are various types of attacks that have been recognized. This paper will focus on the threats that are normally found to be common on the internet and suggest the possible mitigation strategies that can be applied. ARP poisoning Address Resolution Protocol spoofing, also referred to as ARP flooding, or ARP poisoning/ARP poison routing is a mechanism that is employed when one wants to attack an Ethernet wireless or...
4 Pages(1000 words)Assignment

Cyber security

...internationally. Despite the mounting threats in cyberspace, it emerges that the cyberspace domain holds key solutions to these threats. The threats are further compounded by fact that threats are anonymous and emerge from a multitude of sources worldwide (Ward, 2000). With prevailing drastic revolution in cyber technology, the human dimension of the security problem cannot be disregarded. The behavior of the users, failure in compliance with security policy and ignorance of cyber threats are common human factors that compromise the overall security of cyberspace. An...
4 Pages(1000 words)Coursework

Cyber security

...CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when digital data storage is used. The fact...
2 Pages(500 words)Coursework

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework

Cyber Security

... face in cyberspace. The paper seeks to answer questions related to cyber security such as: who is been harmed and by whom, what is the harm/causation, what is the broader implication of the harm and what is the major moral issue on hand. Most importantly, it will discuss how companies use such as rights theory, justice theory, an ethics of character, and an ethics of care while relating the same about the particular incident. Cyber Security - Types The concept of cyber security in modern world is important to understand cyber threat. Cyber security is developed to protect the individual users as well as companies. The term cyber threat can be defined as an outsiders attempt to hamper the normal operation of any particular system... ...
10 Pages(2500 words)Term Paper

Cyber Security

...Cyber Security Stuxnet is a computer virus designed specifically to aid hackers attack industrial plants without the knowledge or identification of the operators. It is the first attack that grants the hackers the opportunity of manipulating world equipment and as a result of this, it is very dangerous. Stuxnet is a product of the U.S and Israel project (Bacrach, 2013). Its impact is well known; it destroyed approximately 20% of Iran’s nuclear centrifuges through making them spin uncontrollably. It also infected a Russian nuclear power plant very badly. In tandem to this, the paper aims at providing detailed information on how Stuxnet was introduced to Iran’s and Russian power plants,...
3 Pages(750 words)Essay

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as...
1 Pages(250 words)Essay

Cyber Security

...Cyber Security al Affiliation Cyber Security Cyber security is emerging global challenge that has seen some s such as North Korea and China implicated in cyber-attacks. Cyber-attack is possible because of cyberspace, a situation where all computers globally are connected to the Internet. Cyberspace comprises of computers, mobile phones and computer network. A state cyberspace, for example, is a global cyberspace because Cyberspace has no borders. Computer networks make a nation cyberspace a global cyberspace. An individual in one side of the world can access information on the other side of the world....
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic How Serious Are Cyber-Security Threats for FREE!

Contact Us