Nobody downloaded yet

Psychological Aspects of Cybersecurity - Assignment Example

Comments (0) Cite this document
Present day technologies and innovations based on the use of computer systems, mobile phones, and the internet have become extensively prone to cyber attacks – either simple malware and spyware codes or serious viruses that can affect the systems and the networks, thus…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Psychological Aspects of Cybersecurity
Read TextPreview

Extract of sample "Psychological Aspects of Cybersecurity"

Download file to see previous pages Today, when the dependency on the use of computer systems and internet technology has increased significantly, the understanding and incorporation of cyber security proves to be highly essential (“What is Cyber Security?” 2010).
The present study has considered social networking as the primary focus in regard to the psychological aspects of cyber security. Social networking in the present times is used by millions of individuals as a means of remaining connected with the outer world, with friends, near and dear ones as well as for professional purposes. However, a lot of personal information is, in turn, being shared in the process that might be used by cyber attackers to spread malevolent codes, viruses, or may even access the personal information and misuse it for their own purposes (McDowell & Morda, 2011, p.1). Thus the need for cyber security arises, and this study focuses on the vulnerabilities and threats associated with social networking and having impacts on the services and the users, thus trying to determine the possible cyber security measures and the level of customer satisfaction that may be achieved.
In the recent years, the use of social networks has been found to have increased significantly. There are several online social networking websites like Facebook, Myspace, YouTube, and LinkedIn, to name a few. The relative size of the addressees in these social networks is huge, which is often not known to the users of the site. Moreover, the nature of such users is also unknown. Hence individuals tend to reveal a lot of personal information. This may actually result in a number of security related threats for the members and hence for the services as well. Thus it proved to be necessary to incorporate such cyber security as to protect personal information on social networks (Hasib, 2008).
When individuals post their personal information on social networks, a permanent record of the users is created that may be used ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Psychological Aspects of Cybersecurity Assignment”, n.d.)
Psychological Aspects of Cybersecurity Assignment. Retrieved from
(Psychological Aspects of Cybersecurity Assignment)
Psychological Aspects of Cybersecurity Assignment.
“Psychological Aspects of Cybersecurity Assignment”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Psychological Aspects of Cybersecurity


...?CYBER-SECURITY Cyber-Security Affiliation Table of Contents Question No 3 Question No. 3 7 References 12 Question No Choose2 Symmetric Encryption Algorithms to compare and contrast. Discuss what they are, how they work, their advantages/disadvantages, and how/why it was created (did it have a problem or purpose it solved). For comparing two symmetric algorithms I have chosen Stream Ciphers and Block Ciphers Encryption Algorithms. Stream Ciphers is a symmetric encryption algorithm that encrypts the bits of data and information. Additionally, this type of encryption is performed on one bit at a time (or occasionally 1 byte at a time) of data at some particular time. In addition, the method of stream cipher is much quicker... Cyber-Security...
5 Pages(1250 words)Essay


...from the Internet, internal networks, and/or other public systems as well as private systems (Schaeffer, Chan, Chan, & Ogulnick, 2009). Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile based device to any information system by utilizing a particular or a combination of varied data transfer methods. Portability is regarded as a key facet of mobile computing (International Association of Medical Science Educators, n.d.). This paper intends to provide a discussion about mobile computing. The discussion comprises recognizing the significant cybersecurity vulnerabilities and related threats associated with mobile computing for the users. The other...
8 Pages(2000 words)Coursework


...? Cyber security Table of Contents Table of Contents 2 Introduction 3 Brief of the Organizations and their Mission 3 Comparison and Contrast of Privacy Policies of Apple Inc., IBM and Microsoft 5 Possible Changes To The Policies For Customer Protection 8 Possible Changes to the Policies to Give More Flexibility to Use Personal Information of Customers 9 References 12 Introduction Privacy policy is fundamentally viewed to be a legal statement or a document that manages and handles precious information of a client or a customer. The privacy policies are often used in various sectors with the intention of safeguarding different valuable information or data of the clients. This particular aspect i.e. privacy policy is much...
7 Pages(1750 words)Coursework

Psychological aspects of attachment

...Running head: Psychological aspects of attachment Psychological Aspects of Attachment: Reconsideration of Mary Ainsworth's Theory PSYCHOLOGICAL ASPECTS OF ATTACHMENT: RECONSIDERATION OF MARY AINSWORTH'S THEORY Definition of attachment and the origins of a theory Attachment is one of the pivotal psychological phenomena, which is commonly identified as a tendency to seek closeness to another person and feel secure when that person is present (Steinberg, 1999). Another definition fo attachment, observing Fraley and Shafer (2000) is an "emotional bond with a specific person that is enduring across time and space". In...
17 Pages(4250 words)Essay

Psychological Aspects Of Divorce

...Reiners English 101 26 September Divorce While researching literature on divorce, I found that fifty percent of all marriages in the United States end in divorce. Also, sixty-seven per cent of second marriages are unsuccessful and end in divorce (Corcoran, “Psychological and Emotional Aspects of Divorce”). These numbers illustrate how important the problem of divorce is today. My goal in this paper is to discuss different kinds of divorce, explore the religious (Christian and Catholic) views surrounding divorce and reveal psychological problems after divorce. To begin with, two basic types of divorce are contested and uncontested divorce. As for the latter, it means that...
4 Pages(1000 words)Research Paper


... Question 3 Vulnerability is a fault in a system that an attacker/hacker uses to reduce the security of the information inthe system. Microsoft XP is known to be vulnerable to several threats; some of them include the following: Microsoft windows XP do not allot adequate memory for SMTP control replies hence allowing hackers to be able to read parts of e-mail messages through the use STARTTL commands. This is known as SMTP memory allowance vulnerability. (Vetterling, 2002) Windows XP is vulnerable in HTTP services where an attacker who notices this flaw can win an absolute control of computer system and be able to manipulate the already installed programs and do any other thing to the system with full user rights. Argument... Question 3...
1 Pages(250 words)Coursework


...the virus to be emailed to 50 recipients in the user’s address book which created an exponential increase in the virus-infected messages. Erdbrink (2012) reports how countries such as Iran have spent massive resources in controlling and preventing viruses. Anti-virus programs combat these viruses and keep the system and network safe from virus attacks. References Aksoy, P. & DeNardis, L. (2008). Information Technology in Theory. Canada, UK: Thomas Learning Inc. Erdbrink, T. (2012, May 29). Iran confirms attack by virus that collects information. The New York Times. Retrieved 2 October 2012 from Ivanova, P. (2006). Cybercrime and cybersecurity. International Journal of Information and Security, 18, 5 –...
1 Pages(250 words)Coursework


...Cybersecurity Your Topic 3 - Some mental health and criminal justice professionals contend that hacking is an"addiction," and causes obsessive, risk taking behavior in a manner similar to illegal narcotics - hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policymakers look towards treatment, rather than incarceration, as the disposition of hacker cases? Why or why not? The study conducted by Solmaz, Bell and Saygili (2011) is interesting. At first, after reading the article, there seems to be a dilemma between hacking as a form of addiction, which requires treatment to just simply being a criminal case. But going through further to their findings, it became clearer...
2 Pages(500 words)Coursework


...Cyber Security   Cyber Security Question There are three encryption techniques: asymmetric, symmetric, and hashing techniques. Asymmetric cryptography utilizes two keys, a public key and a private key to achieve encryption and decryption. In a symmetric cryptograph, the key employed to decrypt and encrypt information should be secured as anyone who can access it can interpret the coded message. Hashing produces a rare, fixed-length signature for a data set or message (Sinkov, 1966). Hashing encryption may be the most suitable for securing encrypted session in an online credit card shopping (Kahn, 1996). This is because it is distinctive to a message, small changes to a message causes a different has, therefore, warning... Security   Cyber...
2 Pages(500 words)Coursework

Psychological Aspects of War

...Psychological Aspects of War and Scholl School Location: Semester: Psychological Aspects of War Mental health consequences of war cannot be denied. There are manifold psychological influences of war on the minds of civilians and also of the armed personnel and their families. There is an increase in mental disorders, especially in vulnerable groups as children, elderly, women, and the disabled. I chose this topic because I am interested in how people cope with the trauma of war, and what can be done to help them deal with it. The servicemen develop moral injury when they have to commit combat acts that contradict with their inner beliefs. Moral...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Psychological Aspects of Cybersecurity for FREE!

Contact Us