StudentShare solutions
Triangle menu

Cyber security - Coursework Example

Nobody downloaded yet
The paper tells that in the current age of union of communication and technology, one cannot resist or keep away from being affected by internet, cyber space, cell phones and computers. However as we marvel our lives due to these technologies and feel blessed, we can’t stop thinking about our own security and safety over the cyber space. Either it be physical security, personal information security or security of our computer’s hardware and soft ware, we are concerned about our safety. Then what basically is cyber security? It is guarding your physical and personal data from any vulnerability such as a digital asset accumulated in your computer, hard disk or any of the memory drives. Firstly, you need to search that what kinds of vulnerabilities you can meet on the internet and what should you do to counter them. There are many distinct types of vulnerabilities and each one of them is serious in its own sense and asks for solutions to overcome it. The higher the vulnerability is, the more complicated or intricate measure would be taken to implement security measures to protect your own self. Beginning from plain malicious codes or malware to grave viruses which can erase all the data on your computers or gulp all the contents of your windows; hackers can utilize your personal data for their deceitful purposes. These are risks that if not properly addressed can create acute problems for you. Often these malicious codes or spyware get into your computer when you enter a new website or open an unknown mail. Every application has some loop holes which are identified by hackers and then it becomes easier for them to exploit your programs. They get access to these files and copy and harm computer applications by clinging themselves to either the junk mail you receive or through your local network provider. These deceitful codes are usually very intricate and tricky so that a normal person using Personal computer cannot access them. IT professionals spend huge amount of their time to solve these codes. These codes are not only restricted to spyware and malware but also consist of bugs, worms and viruses which are a cause of a lot of damage. (Cyber Security (2010)) These malicious codes are very harmful indeed but there is a bigger imposter than them. These are the attackers or hackers. They are much hazardous and harmful then these mere codes. Codes and Viruses can only do what they are designed to do by the original programmer. However, these attackers and hackers are living people who can obtain the necessary information they require and then use it for their own malicious purposes. But sometimes hackers might just be having fun! They want to try their hacking skills and get into your computer just to know how to hack and learn it rather than for any sort of personal benefit. (Cyber Security (2010)) Top Cyber Security Vulnerabilities The Database of National Vulnerability Version 2.2 is vulnerability management data which is run by the United States government and is characterized by SCAP (Security Content Automation Protocol). This data helps in computerization of management of vulnerability, all security measures you can take to avoid it, and obedience or agreement to these measures. National Vulnerability Database ...Show more


The purpose of this research is to investigate the following: top cyber security vulnerabilities; operating system vulnerability; impact of operating system vulnerability on organizations and counter measures to mitigate the impacts of vulnerability of operating systems…
Author : tiffany92
Cyber security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the coursework on your topic
"Cyber security"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Cyber Security (Potential Security Threats, Challenges for Hybrid Cloud Solution, Cyber Security Concerns Associated With Mobile Devices, Nature of Internet Activists)
Internet activists make use of the Web as tools for publication, coordination, and lobbying and coordinate their actions through their members, whereby action plans are e distributed via e-mail or posted on their Web sites (Gardner & Kobtzeff, 2012).
14 pages (3500 words) Coursework
The internet is considered as an exclusive medium for communication as it is not restricted by any kind of physical limitations. Unlike other communication systems, the structure of internet is quite different which gives rise to two aspects.
8 pages (2000 words) Coursework
Cyber security
Hence, it is true to state that cultural values are the building blocks for social morality. Consequently, these cultural values are what instill the moral responsibility within a person to engage in a certain behavior. Furthermore, by extension, the same behaviors instigated by our cultural values are what impact on cyber ethics.
3 pages (750 words) Coursework
Objective: Assess the primary cyber threats to an organization's mission-critical information systems
In the security system against the cyber threats, a company usually determines its target and policies which includes latest and more advance persistent threat (Bodeau, et al, 2010). The level of security or companies, especially of the airports, was totally changed in the entire world after the incident happened on 11th of October in 2001.
4 pages (1000 words) Coursework
In relation to this growth, it is also recognized that cybercrime is also increasing day-by-day. Cybercrime can be defined as the offences committed by certain individuals by accessing different personal and organizational data stored in computers primarily with the help of internet (International Telecommunication Union, 2009).
7 pages (1750 words) Coursework
Cyber security
Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the issues pertaining to intellectual property have in effect aroused immense concern internationally.
4 pages (1000 words) Coursework
Cyber security
This is a true reflection of what takes place when digital data storage is used. The fact that digital storage can cause delays when authorization is needed before
2 pages (500 words) Coursework
Objective: Assess the primary cyber threats to an organizations mission-critical information systems
The level of security or companies, especially of the airports, was totally changed in the entire world after the incident happened on 11th of
4 pages (1000 words) Coursework
The convict individuals are known as hackers. Generally, hackers hack others computers with the help of internet for stealing
7 pages (1750 words) Coursework
Cyber security
However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with the risks out of need. In this scenario, getting
1 pages (250 words) Coursework
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Let us find you another Coursework on topic Cyber security for FREE!
Contact us:
Contact Us Now
  • About StudentShare

  • Testimonials

  • FAQ

  • Blog

  • Free Essays
  • New Essays
  • Essays

  • The Newest Essay Topics
Join us:
Contact Us