StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber Security - Term Paper Example

Cite this document
Summary
With the innovation of internet and high levels of computer programming, organizations are dependent on computer programs to make their operation smoother, less time-consuming and error free. Various…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Cyber Security
Read Text Preview

Extract of sample "Cyber Security"

Download file to see previous pages

With the development of science and technology, the possibility of cyber threat increases. Cyber criminals vary from organized group of hackers supported by various kinds of political, ethical or retaliatory motives to virtual robbery activities, inspired by financial gain. It is vital for organizations to understand the profile and mode of operations of targeted areas. According to Martin (2013), “Targeted, organized and long-term threats categorized as “advanced persistent threats” can be a significant problem due to sophisticated technology, expert attackers and potentially Nation State sponsorship” (p.1). The main objective of this paper is to analyze the concept of cyber security in association with a recent international event.

It analyses the possible threats that people may face in cyberspace. The paper seeks to answer questions related to cyber security such as: who is been harmed and by whom, what is the harm/causation, what is the broader implication of the harm and what is the major moral issue on hand. Most importantly, it will discuss how companies use such as rights theory, justice theory, an ethics of character, and an ethics of care while relating the same about the particular incident. The concept of cyber security in modern world is important to understand cyber threat.

Cyber security is developed to protect the individual users as well as companies. The term cyber threat can be defined as an outsiders attempt to hamper the normal operation of any particular system which is designed to help the normal activities of the people in a society. Cyber threats can be a great danger for the financial sector, government, and the army. In countries such as USA, the statistics associated with the cyber-crime is increasing rapidly. With the situation so alarming, the President of USA, Barack Obama forced to declare the month of

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Security Term Paper Example | Topics and Well Written Essays - 2500 words - 1”, n.d.)
Retrieved from https://studentshare.org/social-science/1653534-cyber-security
(Cyber Security Term Paper Example | Topics and Well Written Essays - 2500 Words - 1)
https://studentshare.org/social-science/1653534-cyber-security.
“Cyber Security Term Paper Example | Topics and Well Written Essays - 2500 Words - 1”, n.d. https://studentshare.org/social-science/1653534-cyber-security.
  • Cited: 2 times

CHECK THESE SAMPLES OF Cyber Security

Jobs in Cyber security

Instructor Date Jobs in Cyber Security According to occupational employment projections to 2014, employment is projected to rise to about 18.... hellip; For instance, in response to the growing threat of cyber-attacks, there has been an increase of Cyber Security positions, and this upwards trend is projected to last over the next 30 or so years (Geeks News Desk); Cyber Security jobs are well paying, and these professional earn way over their counterparts in general IT (Ballenstedt)....
3 Pages (750 words) Essay

Chinese Versus American National Cyber Security

This paper ''Chinese Versus American National Cyber Security'' tells that Cybercrime is a reality that has hit the information networks in a world driven by computer and internet technology.... Countries are engaging national Cyber Security policies to ensure information security as data traverses the information networks.... The purpose of this study is to compare the effectiveness of the national Cyber Security policies that have been applied in China and America and to provide viable solutions to the weaknesses in these policies....
11 Pages (2750 words) Research Proposal

Private Network and Cyber Security

This paper under the headline "Private Network and Cyber Security" focuses on the fact that to prevent an external IP address from somebody pretending to be an internal user, it will be necessary that packet rules with combinations of filters are used.... Companies are also keen to release any of the important information regarded as business security and such information is normally protected with passwords and cookies which prevent hackers from obtaining them (Mason pg 7)....
1 Pages (250 words) Assignment

Cyber Security and Business

In addition, Cyber Security is important to the functioning of safety essential systems like the response to an emergency and to the guard of the government's infrastructure systems.... The private sector has been opposing governments efforts to impose stricter regulation of Cyber Security but it is of great significance to protect the telecommunication sector and electric grid that is in the hands of the private sector.... The author concludes that cybersecurity is very essential to national and homeland security in it assists in barring computer hackers from accessing critical information....
6 Pages (1500 words) Term Paper

Sample Cyber Security Profile

This paper discusses the many facets of protecting these vulnerabilities against large-scale attacks… One of the most crucial elements to understanding within the realm of security is the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element According to many publications, NIST is very proactive in this element as one of the main is attacks on User Domain....
4 Pages (1000 words) Essay

Cyber Security and Startups

The attack targets… The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort Cyber Security and Start-ups What is a DDoS attack?... The attack targets significant resources used by business organizations, security firms or schools by making it a challenge to access the information.... They do not also install security measures to protect against such attacks, which make them vulnerable to pay the ransom demanded....
1 Pages (250 words) Case Study

Cyber Security in Business Organizations

With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks.... Johnson and Goetz (2007) describe security risk management as a balance between “maintaining security” and keeping the Information security failures tip the balance and expose organizations to the aforementioned threats.... Organizations are challenged by the trend to ‘go global' which implies that security programs should encompass the entire global market of a firm....
5 Pages (1250 words) Case Study

Cyber Security and Digital Forensics

This paper "Cyber Security and Digital Forensics" argues that many businesses are unaware of attacks and have slow responses to these risks that endanger the security of the entire organization.... nbsp;The rapid penetration of the internet has raised the potential for security threats for businesses globally.... Malware is a common term applied in defining malicious software that contributes to security threats to a computer system and the internet (Rossow 5-6)....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us