Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Cyber Security - Term Paper Example

Comments (0) Cite this document
With the innovation of internet and high levels of computer programming, organizations are dependent on computer programs to make their operation smoother, less time-consuming and error free. Various…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Cyber Security
Read TextPreview

Extract of sample "Cyber Security"

Download file to see previous pages With the development of science and technology, the possibility of cyber threat increases. Cyber criminals vary from organized group of hackers supported by various kinds of political, ethical or retaliatory motives to virtual robbery activities, inspired by financial gain. It is vital for organizations to understand the profile and mode of operations of targeted areas. According to Martin (2013), “Targeted, organized and long-term threats categorized as “advanced persistent threats” can be a significant problem due to sophisticated technology, expert attackers and potentially Nation State sponsorship” (p.1).
The main objective of this paper is to analyze the concept of cyber security in association with a recent international event. It analyses the possible threats that people may face in cyberspace. The paper seeks to answer questions related to cyber security such as: who is been harmed and by whom, what is the harm/causation, what is the broader implication of the harm and what is the major moral issue on hand. Most importantly, it will discuss how companies use such as rights theory, justice theory, an ethics of character, and an ethics of care while relating the same about the particular incident.
The concept of cyber security in modern world is important to understand cyber threat. Cyber security is developed to protect the individual users as well as companies. The term cyber threat can be defined as an outsiders attempt to hamper the normal operation of any particular system which is designed to help the normal activities of the people in a society. Cyber threats can be a great danger for the financial sector, government, and the army. In countries such as USA, the statistics associated with the cyber-crime is increasing rapidly. With the situation so alarming, the President of USA, Barack Obama forced to declare the month of ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cyber Security Term Paper Example | Topics and Well Written Essays - 2500 words - 1”, n.d.)
Retrieved from
(Cyber Security Term Paper Example | Topics and Well Written Essays - 2500 Words - 1)
“Cyber Security Term Paper Example | Topics and Well Written Essays - 2500 Words - 1”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Cyber Security

... our own security and safety over the cyber space. Either it be physical security, personal information security or security of our computer’s hardware and soft ware, we are concerned about our safety. Then what basically is cyber security? It is guarding your physical and personal data from any vulnerability such as a digital asset accumulated in your computer, hard disk or any of the memory drives. (Cyber Security (2010)) Firstly, you need to search that what kinds of vulnerabilities you can meet on the internet and what should you do to counter them. There are many distinct types of vulnerabilities and each one of them is serious in its own sense and asks for solutions to overcome it. The higher the vulnerability is, the more complicated...
10 Pages(2500 words)Coursework

Cyber security

...? Cyber Security Topic Cultural values as viewed in the static sense represent the heritage and traditional norms that govern behavior in society. However, in the dynamic state it represents contemporary beliefs expressed modes through ideas, creativity in thought and actions. Hence, it is true to state that cultural values are the building blocks for social morality. Consequently, these cultural values are what instill the moral responsibility within a person to engage in a certain behavior. Furthermore, by extension, the same behaviors instigated by our cultural values are what impact on cyber ethics. An example of how cultural values impact on the moral legitimacy can be drawn on the norms regarding theft in society. The golden rule...
3 Pages(750 words)Coursework

Cyber security

...? Cyber Security Organizational business mission and related security goals Intellectual property is a juridical concept that refers to creative formations of the mind that have exclusive rights. Owners of the creations are granted exclusive rights on intangible assets as stipulated in the intellectual property law on intangible creations such as music, works of art, inventions, designs, symbols and innovations. Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the issues pertaining to intellectual property have in effect aroused immense concern...
4 Pages(1000 words)Coursework

Cyber Security Industry

... such as business overview, marketing, human resource, and financial information explicitly and comprehensively that one needs to consider for the start-up of a business. Table of Contents EXECUTIVE SUMMARY 1 Table of Contents 2 THE BUSINESS 3 Description 3 Operational Overview 3 MARKETING 5 Target Market 5 Market Research 5 Four Ps 6 Competition 8 HUMAN RESOURCES 10 Planning 10 Recruitment 11 Training & Development 12 Retention 13 Management Philosophy 14 FINANCIAL DATA 15 Sales Analysis 16 Projected Profit and Loss Statement 18 Projected Balance Sheet 19 REFERENCES 21 APPENDICES 22 Project Plan 22 THE BUSINESS Description By looking at the market trends of the growing businesses, it has come to notice that cyber security industry is one...
14 Pages(3500 words)Research Paper

Cyber security

...CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when digital data storage is used. The fact that digital storage can cause delays when authorization is needed before files...
2 Pages(500 words)Coursework

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with the risks out of need. In this scenario, getting knowledge of previous...
1 Pages(250 words)Coursework

Cyber Security is used to denote cyber security. Effective cyber security employs coordinated efforts throughout the information system. Some of the major elements of cyber security include end-user education, application security, disaster recovery/ business continuity planning, network security and information security (Marshall, 85). World governments devote huge sums of their annual budgets towards enhancing cyber security with the United States in particular, since 2010 allocating over 13 million USD annually for the next 5 years to...
1 Pages(250 words)Essay

Sample Cyber Security Profile

... As society progresses to 21st security, the concept of security becomes a critical element in a very advanced world. Commerce, transactions,and work is conducted through the internet and technology. Leaving contemporary ways also results in more vulnerabilities with new technologies. This paper will discuss the many facets of protecting these vulnerabilities against large-scale attacks. One of the most crucial elements to understand within the realm of security are the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element. According to many publications, NIST is very proactive in this element...
4 Pages(1000 words)Essay

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as infected while they are not. If such antivirus are programmed to be deleting files...
1 Pages(250 words)Essay

Cyber Security and Startups

...Cyber Security and Start-ups What is a DDoS attack? A DDoS Attack is an attempt to make an online service inaccessible by overpowering it through the obstruction from various sources. The motive of the attacker is to receive payments in Bitcoins before releasing the service to resume its normal functions. The attack targets significant resources used by business organizations, security firms or schools by making it a challenge to access the information. The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort more users (Perlroth & Wortham, 2014). How can a small company protect itself from DDoS attacks? A small company can protect itself...
1 Pages(250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Cyber Security for FREE!

Contact Us