StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber Network Security, Threats, Risk, and Its Prevention - Dissertation Example

Cite this document
Summary
This dissertation "Cyber Network Security, Threats, Risk, and Its Prevention" is about a crime that has created major concerns in the modern world with the greater advancements in the field of information technology, and the misuse being increased…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Cyber Network Security, Threats, Risk, and Its Prevention
Read Text Preview

Extract of sample "Cyber Network Security, Threats, Risk, and Its Prevention"

Download file to see previous pages

The rapid change in technology has significant effects on the everyday lives of humans influencing all the aspects of life such as medicine, commerce, education, and security. Information technology seems to influence the lives of individuals similarly since it has brought improvements in individual lives, in the family lives, in education, career, democracy and freedom, and every other aspect of life where information is needed. During the 1990s, the entire world could be seen to be developed around the telecommunicated networks of computers incorporating the use of information systems and technology.

The power of information is largely responsible for contributing to the spheres of human activities. Be it genetic engineering or the development of software, information technology is enabling progress across every field of advancement across the world (Castells, 1999, p.2). However, considering the topic of information technology, the concern for security also arises to which it can be stated that the technology has both a good side as well as a bad side. While IT may be used for the purpose of promotion and stability of security, on the other hand, the system can also be misused that threatens the system and its use.

The positive uses of IT come in the way it can be used to distribute and exchange ideas and strategies for security, to draw together support for harmonious missions and security programs, and to put into practice and organize security plans and operations. It is crucial in every operation of the government of any country, spreading its functions from intelligence collection to command and control. Even targeting terrorists and implementation of controls over borders can be achieved through the use of IT (Denning, 2003, p.1). However, the negative side of IT reflects on its misuse and the effects of cybercrimes that have significant concerns in every organization across the world.

Information technology can be easily attacked and taken advantage of that, in turn, threatens the issues of stability and security. 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Network Security, Threats, Risk and Its Prevention Dissertation”, n.d.)
Cyber Network Security, Threats, Risk and Its Prevention Dissertation. Retrieved from https://studentshare.org/information-technology/1451549-cyber-eknetwork-security-threats-risk-and-how-it
(Cyber Network Security, Threats, Risk and Its Prevention Dissertation)
Cyber Network Security, Threats, Risk and Its Prevention Dissertation. https://studentshare.org/information-technology/1451549-cyber-eknetwork-security-threats-risk-and-how-it.
“Cyber Network Security, Threats, Risk and Its Prevention Dissertation”, n.d. https://studentshare.org/information-technology/1451549-cyber-eknetwork-security-threats-risk-and-how-it.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Network Security, Threats, Risk, and Its Prevention

Threats and Methods to Secure a VoIP Network

ith increasing use of this technology combined with modern technology and its users, VoIP faces many security issues that need to be covered and prevented in order to make this technology as one of the best for the companies.... billions dollars, and according to Idate in 2010, 70% of the phone line in business world will be running on IP port. Like with any new technology, in the early days of VOIP, there were no serious concerns about security related to its use....
17 Pages (4250 words) Essay

Evaluate the options at the security manager disposal to respond to organizational lost

In response to security threats to organization's data, organizations have implemented diverse tools to mitigate and contain those threats through approaches such as passwords, encryption, firewalls, access-control lists, network traffic monitoring, system audits, and patch management.... This essay will mainly focus on the threats, dangers and risks that organizations are exposed to in the arena of Information Technology, approaches that managers can adopt to reduce them....
11 Pages (2750 words) Essay

Avoiding Cyber Threats in E-Commerce

The paper "Avoiding Cyber Threats in E-Commerce" provides a deep insight into measures available to prevent cyber-attacks - intrusion detection prevention systems, firewalls, encryption, anti-virus software, and login passwords, and programs for enhancing consumers' awareness of security.... he cybersecurity departments need to have strategies that balance resiliency with focused, protection, risk-informed prevention, and preparedness activities in order to manage and reduce the most deleterious risks in e-commerce....
6 Pages (1500 words) Essay

Cyber Security as the Process of Different Security Measures

The Department of Homeland Security, for instance, is committed to improving its cyber networks and infrastructure, as well as cyber security across all key information sectors.... This essay analyzes that Cyber security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data.... Cyber security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops....
6 Pages (1500 words) Essay

The IT Infrastructure of the Pharmacy Business

Hence, the organization needs to focus on enhancing its physical security control, so that the overall risk and uncertainty of the business could be minimized.... Again, proper control and access of people to information should also be assured to deal with security threats.... IT security should focus on aspects such as network security, physical security as well as data security (Olzak, 2010).... nbsp;Notably, the pharmacy business is currently using Firewall, Desktop computers, Windows 2012 active directory domain controllers (DC), Dedicated T1 connection, and File server for its IT operations all of which are open to both physical and logical threats....
8 Pages (2000 words) Case Study

Compilation of Security Data Issues

The hardware protects crucial data by preventing external threats penetration into the network.... The paper 'Compilation of security Data Issues' focuses on data security issues.... The paper is a compilation of ten security data issues.... Data security means safeguarding data, like a database, from disparaging forces, and from the undesired actions of unauthorized personnel.... hellip; The author states that unauthorized access to data is one of the data security issues affecting businesses....
12 Pages (3000 words) Report

Systems Theory and Physical Security

 The focus of this paper "Systems Theory and Physical security" is to discuss the systems approach to physical security and why it is necessary for the protection of assets.... System theory plays a significant role in that they offer security and can, therefore, be used to offer both safety and security (Schultz et al, 2001)....
13 Pages (3250 words) Term Paper

CERT Australia Network Threat Risk Assessment

The solutions that fit into the Situational Crime prevention approach are also discussed.... The countermeasures that can be used against such counter-attacks are also highlighted and their position in the Situational Crime prevention network.... CERT Australia works with other government agencies such as the Cyber Security Operations Centre to deliver its mandate.... CERT Australia works with other government agencies such as the Cyber Security Operations Centre to deliver its mandate....
14 Pages (3500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us