StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Threat Analysis - Term Paper Example

Cite this document
Summary
This paper 'Cyber Threat Analysis' is mention companies that provide cyber threat analysis services. In addition, the paper continues to by discussing future speculations about the fate and integration of cyber threat analysis…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Cyber Threat Analysis
Read Text Preview

Extract of sample "Cyber Threat Analysis"

? Cyber Threat Analysis The increasingly growing technology has been stamped with similar rise in technological crimes. The rise of computers and internet that led to development of global world witnessed similar rise in cyber crimes that also conducted through internet and by the use of computers. Cyber crimes have had very serious implications on the economic and data security of various organizations and world in general. In attempts to reduce cyber mayhem, the following paper will discuss the concepts of cyber threat analysis and technologies involved in accomplishing the task. The paper will also mention companies that provide cyber threat analysis services. In addition, the paper will continue to by discussing future speculations about the fate and integration of cyber threat analysis. Cyber Threat Analysis Introduction Computer and internet users have been met with dire and consequences that have sought to deny them their freedom and sense of enjoyment when using various software and computer hardware that link to the internet. The World Wide Web has become a risk ground where individuals can be attacked by malicious programs that may work to ruin important information stored and retained in individual computer system. The issues of cyber threats have been very serious and grievous as the risks involved have exposed secrete information of particular organizations to unauthenticated individuals. Attackers of information systems of particular organizations have used the vantage to fell particular organizations or scuttle their normal operations. Government agencies have also faced the forsaken effects of cyber threats as witnessed with exposure of critical government information to unwarranted individuals. The graveness of cyber threats in the contemporary global world necessitated technologists and scientists to research ways of by which information systems can be secured from the detrimental attackers. Cyber threat analysis is thus one of the techniques investigated to assist in detection, prevention, studying and destruction of internet threats. As postulated by Janczewski and Colarik (2005), cyber threat analysis basically involves examination, determination and identification of the possible loopholes in the information system of an organization that can expose the particular organization to threats of information distortion. Cyber threat analysis involves numerous steps projected to ensuring attaining of the best ways of protecting organization’s information system. Cyber threat analysis begins with determination of an organizations total expenditure on particular assets whose information is stored in the computer systems. The analysis also takes into consideration the organizational values including tangible and intangible costs required in obtaining, creating and maintaining the needed security in the information system. Cyber threat analysis will also consider individual organization’s image and reputation in the public domain. In addition, cyber threat analysts also scrutinize the historical information threats witnessed in the organization and their likelihood to occur in the future. Furthermore, the analysis of the cyber threats takes into consideration any probable threats and dangers that are likely to attack the information domain system of an organization. After determining the most probable threats, cyber threat analysts are required to move further and identify the possible ways and avenues by an organizations’ information system may get attacked. As depicted by Janczewski and Colarik (2005), cyber threat analysts also need to speculate possible qualitative and quantitative amount(s) of damages that an attack may cause to an organization. Janczewski and Colarik (2005) further propose that cyber threat analysts should define possible strategies that may help in minimizing information damages in case a serious and highly protracted attack. The Technologies Involved With Cyber Threat Analysis The effectiveness of cyber threat analysis requires technical and highly thought technologies to help achieve the real protection of information systems. The most recent and highly voted technology in the cyber threat analysis is the Hidden Markov Model (HMM). As outline by Kim et al, HMM technology has the capability of detecting cyber threats identifying hidden state of information and the observable state. In the process of risk identification by HMM, the hidden state of threat is analyzed by the observable state. HMM then does correlation probabilities between the hidden states and the observation states of the threat Scientists have been reported to develop a technology of facial recognition intended to replace the use of passwords and pins in computer systems. The facial recognition technology is capable of tracking number of information exchanges and the actual computers involved in those particular exchanges. This technology makes it particularly easy to spot a malicious web user and even track the individual in case of any damage in ones information system. Cyber threat analysts have also introduced the concept of channel consolidation (Knapp, 2009). Channel consolidation ensures concentration of emails, search engines, messages, data and voice calls to offer easier method by which threats can be detected and malicious offenders prosecuted. Information safety and protection have also involved the use of firewalls that have ensured filtering of information thus blocking packets that are considered malicious. Firewall works effectively as it is able to encode and decode data only through the sending address, recipient address, sending port and destination port. Firewalls ensure that information in transit is not accessed by any address that is not specified in the connection (Barnes, 2002). Encryption has also been in great use by most of the cyber threat analysts in ensuring safety of information in transit. Encryption works by transforming another format unique to unspecified receiver. Once the data arrives at the intended recipient, then it gets translated into a readable format. Encryption has been very effective in ensuring information security especially where participants keep the codes secrete to themselves (Barnes, 2002). Tunnelling has also provided another reliable technique of ensuring protection and safety of information systems. Tunnelling involves the use of firewalls by both end parties engaged in exchange of data. Data under transmission is usually broken into packets sent to recipient where the information gets decrypted and translated into original form. Companies Offering Cyber Threat Analysis Services One of the known companies offering cyber threat analysis services is the Accenture. The company works to ensure data security for government agencies, private companies and all citizens in general. Another company offering cyber threat analysis services is the ESET, which is located in San Diego, California. ESET offers a range of protective mechanisms including ESET Smart Security and ESET Cyber security for Mac. ESET Smart Security provides antivirus, antispam and antispyware that ensure safety and efficient scanning of client’s information system. Future Forecasts in Cyber Threat Analysis The future focus of cyber threat analysis leads to the introduction and development of cloud computing technology. Efforts by scientists are underway to integrate cloud computing into an opportunity for ensuring secure cyber system. In attaining this, scientist focus of incorporating the use of quantum mechanism that can allow reception of encrypted data by computer systems, which are the processed and results conveyed without actual decryption. There are also substantive efforts by technologists to create converge and create a common world network through world wide data and voice calls are exchanged. This strategy is to ensure a common network that will make it easy to track and prosecute malicious cyber users. Regulation of Cyber threat analysis There are various legal regulations governing the scope of cyber threat analysis at both the corporate and the US Federal level. The Federal Information Security Act (Cap2002) directs agencies to formulate appropriate mechanisms for protecting their individual information systems. In addition, the Federal Information Security Act (FISMA) obliges NIST to structure adaptable security standards for protecting federal computers and information systems from attacks (Moteff, 2004). FISMA laws also direct for periodical security assessments of the information systems of various agencies to determine the effectiveness of their plans and make adjustments where necessary. To ensure thorough Federal participation in the implementation process of cyber security, FISMA offers the Director of Office of Management Budget the responsibilities of monitoring various agencies to ensure compliance to the policies, principles and guidelines of cyber security (Moteff, 2004). Global implication of cyber threat Analysis Cyber attacks have had negative impacts on the global operations ranging from security of various countries and economies. According to Cashell et al (2004) cyber attacks have resulted to closure of businesses due to blockage of websites of particular organizations. Cyber threats and attacks have also led to destabilization of stock prices in various countries. Cyber threats and attacks are also disastrous to global peace and stabilization as particular anonymous combatant may use internet to demean the sovereignty of certain nations. Such occurrences were ones witnessed in America and South Korea (Lewis, 2009). Internet has also been used by terrorists to conduct cyber attacks on nations like America where they harvest critical information about the government. It is from the information that terrorists hack in the internet that they use to plan actual terrorist activities. Conclusion The continued technological advancement has been coupled with longitudinal rise in cyber crimes. Cyber or internet has become the safe zones for technical thieves who are capable of hacking financial information of various organizations and individuals. Such practices and other malicious activities involve great threats to the global security and economic stabilities. Cyber threat analysis is probably the best remedy of reducing or bringing to halt such antisocial practices. Cyber threat analysis involves technical and sophisticated mechanism and ideologies of studying, detecting, analyzing and preventing cyber threats and attacks on information systems of particular organizations. Cyber threat analysis involves the use of technological software like firewalls and antivirus, tunnelling of information, encryption of information and latest mechanism such integration of HMM and cloud computing. References Accenture opens cyber security "threat analysis centre" in San Antonio. (2010). Business Wire, pp. n/a. Barnes, V., et al. (2002). Protecting Information Systems and Data of Companies. Retrieved March 29, 2012 from: http://www.unf.edu/~gfane/docs/sample_paper.pdf Cashell, B. Et al. (2004). The Economic Impact of Cyber-Attacks. Retrieved March 29, 2012 from: http://www.cisco.com/warp/public/779/govtaffairs/images/CRS_Cyber_Attacks.pdf Cordesman, A. H., Cordesman, J. G., & Center for Strategic and International Studies (Washington, D.C.). (2002). Cyber-threats, information warfare, and critical infrastructure protection: Defending the U.S. homeland. Westport, Conn: Praeger. ESET announces research expansion with cyber threat analysis centre. (2010). Business Wire, pp. n/a. Howard, R. (2010).Cyber Security Essentials. New York: CRC Press. International Conference on Global Security, Safety, and Sustainability, Magalha?es, S. T., Jahankhani, H., & Hessami, A. G. (2010). Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, proceedings. Berlin: Springer-Verlag. Janczewski, L., & Colarik, A. M. (2005). Managerial guide for handling cyber-terrorism and information warfare. Hershey PA: Idea Group Pub. Knapp, K. J. (2009). Cyber-security and global information assurance: Threat analysis and response solutions. Hershey, Pa: Information Science Reference. United States. (2004). Technology assessment: Cybersecurity for critical infrastructure protection. Washington, D.C: U.S. General Accounting Office (441 G St. NW, Room LM, 20548. Verton, D. (2003). Black ice: The invisible threat of cyber-terrorism. New York [u.a.: McGraw-Hill/Osborne. Moteff, J. (2004). Computer Security: A Summary of Selected Federal Law, Executive Orders, and Presidential Directives. Retrieved march 29, 2012 from: http://www.cisco.com/warp/public/779/govtaffairs/images/CRS_Cyber_Attacks.pdf Kim, D. Et al. Cyber Threat Trend Analysis Model Using HMM. Retrieved March 29, 2012 from: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-symc_cyber_threat_analysis_program_WP_250478.en-us.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber threat analysis Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1446551-cyber-threat-analysis
(Cyber Threat Analysis Research Paper Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1446551-cyber-threat-analysis.
“Cyber Threat Analysis Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1446551-cyber-threat-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Threat Analysis

Strategic Marketing Plan for Hot Coffee Cyber Cafe

SWOT analysis is a double impact tool that analyses both internal and external factors influencing an organization on the whole; Strengths and Weaknesses are internal, while Opportunities and Threats are external factors.... This paper highlights the strategic marketing plan for a Coffee cyber Cafe.... nbsp; … The present strategy that is deployed by the Hot Coffee cyber Café is the “Differentiating Strategy”.... No other cyber café offers such services that are offered by our café i....
14 Pages (3500 words) Assignment

The Cyber Organization and Development of IT

There is certainly no doubt that Information Technology has impacted upon the large majority of the worlds population, with respect to many areas of their lives, ranging from within the very elementary school level to that of the large organizations conducting multibillion… The impact of the development of such Information Technology, inclusive of equipment and peripherals has extended specifically into the office environment fostering the opportunities of decentralisation, away from the traditional "office cubicle" This does not however imply the so-called cyber infrastructure is the utopia of office environments, albeit on a virtual basis, there are a number of factors that also contribute to the threats towards this modern type of infrastructure, as well as a number of factors that may well culminate within the "failures in the cyber infrastructure" (Goetz & Shenoi p....
10 Pages (2500 words) Essay

Community threats

This region has felt the effects of injustice, and now faces an even greater threat.... This is a threat to the county of Calhoun because there are possibilities of attacks from the... There are several community threats that the residents of this county are subjected to in their lives....
4 Pages (1000 words) Assignment

Cyber Threat Analysis Services

This coursework "Cyber Threat Analysis Services" discusses the concepts of Cyber Threat Analysis and technologies involved in accomplishing the task.... It discusses companies that provide Cyber Threat Analysis services and future speculations about the integration of Cyber Threat Analysis.... Cyber Threat Analysis is thus one of the techniques investigated to assist in detection, prevention, studying and destruction of internet threats....
6 Pages (1500 words) Coursework

Cyber Security Issues

1992) which represent internal and external forces that can influence whether or not a threat is able to be realized and/or affect the severity of such a threat if it were to occur.... For example at the individual level, the threat may not be deemed as very harmful but at the corporate and governmental levels where network services are used, a greater quantum of harm are done infrastructures.... or any identified threat, there is no denying the fact that the best approach to dealing with it is a corresponding security solution but in today's diversifying computer system, this approach has been difficult and in some cases, lacking....
38 Pages (9500 words) Report

Analysis of Gary McKinnon - UK Hacker Case

"analysis of Gary McKinnon - UK Hacker Case" paper is based on the severity of crime McKinnon committed and the risks involved in cybercrime.... hellip; From the above research and analysis, it is clear that cyber-crimes are very dangerous because it not only involves a threat to a person but also causes a threat to an entire nation.... The criminal activity of Gary McKinnon shows that the chances of national threat and terrorism are very high for any country in the world....
5 Pages (1250 words) Case Study

How Serious Are Cyber-Security Threats

since this is not a political analysis.... This paper will delve into varied facets of cybersecurity and threats to bring forth the impact of this area concerning governmental and non-governmental areas, how these affect government relations internationally, varied cybersecurity breaches and analytical evaluation of breaches and their repercussions....
9 Pages (2250 words) Coursework

Principles of Cyber Forensic

The paper "Principles of cyber Forensic" discusses what digital evidence entails, the principles of cyber forensic, and computer data threats.... hellip; This paper discusses cyber forensics which is a process of investigating the cyber or digital crime, collecting the data, as well as analyzing them to come up with enough tangible digital or physical evidence that can be presented into a court of law to and ensure that the suspect is justifiably judged....
14 Pages (3500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us