This essay analyzes that Cyber Security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data. Cyber Security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops…
National security, economic vitality, and daily life of individuals vastly depend on safe, resilient, and stable cyberspace. Cyber Security is a global concern because cyberspace is increasingly becoming a crucial asset to nations. However, few countries possess an arguably secure digital infrastructure – the United States no exception (Singer & Friedman, 2014). The Department of Homeland Security, for instance, is committed to improving its cyber networks and infrastructure, as well as cyber security across all key information sectors. Meanwhile, cyber attacks and intrusions have increased significantly over the last two decades, disrupting critical operations, exposing sensitive business and personal information, and imposing exorbitant costs on economies. As a result, countries must make significant advances in securing their systems from potential state-sponsored operations and intrusions and growing threat of cybercrime (Singer & Friedman, 2014, pp67). Overall, contemporary organizations must adhere to the conventional cybersecurity standards to curb cybersecurity attacks and enhance safe security techniques.
The reasons and motivations for violations of computer security vary between hackers/crackers. For instance, some hackers are extremely skilled and vastly motivated with the goal or objective of compromising the computers of an organization for espionage or financial gain (Reveron, 2013, pp56). Other hackers are simply vandals and thrill-seekers, commonly involved or responsible for ruining websites and web pages. In most cases, attackers deface websites to make the political statement.
Furthermore, multiple cyber-crimes that occurred in the last decade targeted both private companies and government agencies. For instance, commercial websites such as Amazon.com, Yahoo.com, CNN.com, eBay.com, and Buy.com hit colossal DOS in the year 2000. ...
Cite this document
(“Cyber Security as the Process of Different Security Measures Essay”, n.d.)
Retrieved from https://studentshare.net/information-technology/730563-literature-survey-about-any-security-subject
(Cyber Security As the Process of Different Security Measures Essay)
“Cyber Security As the Process of Different Security Measures Essay”, n.d. https://studentshare.net/information-technology/730563-literature-survey-about-any-security-subject.
It is evident from the study that talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats.
It has made our life very easy, and something that would take months and weeks are solved in matter of hours with help of these digital devices. One can hardly imagine an activity that would not involve the computer and other digital equipment being used in them.
Hence, it is true to state that cultural values are the building blocks for social morality. Consequently, these cultural values are what instill the moral responsibility within a person to engage in a certain behavior. Furthermore, by extension, the same behaviors instigated by our cultural values are what impact on cyber ethics.
Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the issues pertaining to intellectual property have in effect aroused immense concern internationally.
ices like banking and finance, personal investment, clothing stores or any other electronic or non-electronic products access consumer by simply logging on to the internet. US President Barack Obama in mentioned in a speech “Technology is reshaping every aspect of our lives,
The paper aims at providing detailed information on how Stuxnet was introduced to Iran’s and Russian power plants, how it spread to the International Space Station, the lost information as well as the technological improvements that need to be employed in preventing its recurrence.It is known that Stuxnet is a product of the U.S and Israel project.