StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Security: Foundations of Risk Management - Research Paper Example

Cite this document
Summary
The research paper 'Cyber Security: Foundations of Risk Management' focuses on cybersecurity and how it poses to be a huge risk now and the next decade. It has focused on the factors that make cybercrime thrive and how it can be mitigated. With the world of technology changing as fast as people can handle America is finding itself in a tight position…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Cyber Security: Foundations of Risk Management
Read Text Preview

Extract of sample "Cyber Security: Foundations of Risk Management"

CYBER SECURITY Introduction The research paper will be oncyber security and how it poses to be a huge risk now and the next decade. It has focused on the factors that make cybercrime thrive and how it can be mitigated. With the world of technology changing as fast as people can handle America is finding itself in a tight position. The superpower needs technology in its different fields to thrive but also privacy and confidentiality of such program me needs to be enhanced to help in mitigating and preventing the wrong data of people in accessing the documents (Harris). The American government understands that cyber security is a very complicated war and it needs a lot of intelligence to be able to ensure that in as much as organizations are transacting and conducting business it is important for them to be regulated to ensure that safety standards are adhered to. The challenge in cyber security is that it affects different losses from loss of privacy to loss of even finances and it goes to the extent where crucial data can be lost. Hackers can be in the country or outside the country. The challenge is that this war is beyond borders and with the world changing fast it will be a huge challenge in America in the next decade. There are many factors that are contributing to this vice one of it is that it is a channel that terrorist can use so as to further their agenda. By accessing the security intelligence system terrorists may be able to gain some ground they can also steal crucial data that they may use to their advantage such as weapons manufacturing and analyzing the best time to attack (Huffman). The second most crucial factor is greed. There are many way people can access financial transactions using the internet. Banking industry is the most affected whereby hackers try to steal money electronically even though they have really tried to do their part the financial losses have been going on for a while. This is what makes America have enemies from within their country. Criminals who want to get easy money. The third challenge that is proving difficult is the lack of trust among countries. American government was recently accused by Germany of hacking their Prime minister cell phone. Such acts have brought about mistrust among trusted allies in the fight against cybercrime. Apart from America Sony entertainment a company subsidiary to Sony limited wanted to release a movie that brought out diplomatic battles where North Korea allegedly hacked into the system and stole all data from Sony then released confidential emails among the Staff to the public. This cannot be ignored as petty as it brought a lot of losses to the company. From a business angle Sony Investors must have been shocked by the turn of events that occurred. Though North Korea denied they were involved investigations revealed they were involved? This is just a case of example why Cybercrime is difficult to handle and does pose as a big threat to America and to the world in general. It is clear now that in this war countries don’t know from where they will be attacked it’s a matter of preparing for the worst and hoping for the best. Another factor is that there are no enough laws regulating about cybercrime and also they differ from one country to another therefore making it a challenge to fight it. There are cases whereby suspects hacking the American system are traced to Russia but Russian government denies involvement and refuses to handover suspects. Such case brings about misinformation and this is a big threat where America needs to find a solution to this because without unity in this war it will be fruitless (Joseph). This factor makes it possible for the American government to fight this but will depend on this on how to mitigate this in the next decade. To be able to overcome this threat the cyber security standards needs to be put in place so as to ensure that they try and mitigate the losses. They were set up in 2007 and the role was to help in transparency and ensuring efficiency in the business today. The implementation will help in combating cybercrime as this will help the Interpol in accessing the criminals from wherever they will be. It is always noted that for some threat to be combated unity has to be the rule of the game and the American government need to ensure that the states speak the same voice in legislation. Sanctions for countries that are not ready to arrest the hackers are a very good solution. If a country is not ready to ensure a safe internet than the country should be held liable. America being a superpower can easily mobilize its trade partners on this rule and in the end they will have benefitted also as there will be more surveillance from different countries and this will help arrest or block unsecured channel. Financial institutions that have really been affected by this should come up with a blacklisted listed where specific accounts should not be able to access fraud money and also be able to report suspicious accounts to authorities. The freezing of bank accounts can go a long way in tracing the acts committed how, when and by whom? This requires real time intelligence and cooperation. The impact of cybercrime can be felt from many different sectors of an economy and that is why it is very vital to ensure it does not occur. Financial sectors are prone to this the telecommunications sector can also be prone as this will also affect privacy. The medical field is also culpable when investing in research and development. The security industry also depends on the success of Cyber crime and also unearthing cybercrime that may lead to other prevention in future. It is also good to ensure that as we ensure the internet is safe we do not infringe on people privacy and confidentiality. Any human being is bound to have secrets and as long as they do not affect another why bother? The professionals need to look at this from a wider scope and ensure communication is done. Conclusion Cybercrime is a challenge that is just starting and it is best we become prepared than sit and wait until it destroys us. It is not a onetime event but it is always one step at a time for one to be successful. REFERENCES 1)Harris, Peter. "The Looming Danger." How to Curb Cyber Security (2013): 45. 2) Huffman, Martin. "Risk Management." Risk Management in the 21st Century (2014): 117. 3) Joseph, Mercy. "The Next Battlezone." The internet effect (2012): 39. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Foundations of Risk Management Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/management/1689830-foundations-of-risk-management
(Foundations of Risk Management Research Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/management/1689830-foundations-of-risk-management.
“Foundations of Risk Management Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/management/1689830-foundations-of-risk-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Security: Foundations of Risk Management

Cyber Network Security, Threats, Risk, and Its Prevention

This dissertation "Cyber Network Security, Threats, risk, and Its Prevention" is about a crime that has created major concerns in the modern world with the greater advancements in the field of information technology, and the misuse being increased.... The rapid change in technology has significant effects on the everyday lives of humans influencing all the aspects of life such as medicine, commerce, education, and security.... However, considering the topic of information technology, the concern for security also arises to which it can be stated that the technology has both a good side as well as a bad side....
36 Pages (9000 words) Dissertation

Jobs in Cyber security

Instructor Date Jobs in cyber security According to occupational employment projections to 2014, employment is projected to rise to about 18.... For instance, in response to the growing threat of cyber-attacks, there has been an increase of cyber security positions, and this upwards trend is projected to last over the next 30 or so years (Geeks News Desk); cyber security jobs are well paying, and these professional earn way over their counterparts in general IT (Ballenstedt)....
3 Pages (750 words) Essay

The Impact of Mobile Devices on Cyber Security

The author of this essay "The Impact of Mobile Devices on cyber security" investigates the issues of cybersecurity.... The first impact of mobile devices is the making of cyber security a complex venture with regards to the development and enforcement of effective strategies.... According to Metzler, management of such devices owned by employees is complex 'because it is much more difficult to maintain standardization.... The cyber attack has been defined by Kostopoulos (2013) as the action intended to undermine computer or electronic communications network functioning....
4 Pages (1000 words) Essay

Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting

Regardless of the presence or absence of cybercrime laws however, the apprehension and prosecution of perpetrators have been made difficult by the nature of the offence, including the complications related to the cyber security awareness and cyber incident reporting (McGuire and Dowling, 2013; KPMG, 2011).... This paper shall carry out a literature review of cybercrimes, cyber security awareness, including cyber incident reporting.... Related details shall refer to the usual cybercrimes which have gained notoriety and in general, government actions related to cybercrimes, and the challenges presented by cybercrimes and cyber security....
28 Pages (7000 words) Literature review

Cyber Criminals and Other Data Security Dangers

The author popularizes the possibilities of ISO 27001 Information Security management Standard which aims to rectify and mitigate those threats.... This paper 'Cyber Criminals and Other Data security Dangers' gives a detailed overview of data safety odds by discussing true world examples.... There are numerous cases where IT managers have failed to provide or define adequate security for an enterprise-wide infrastructure of an organization.... Likewise, they emphasize more or external security threats rather than internal vulnerabilities....
16 Pages (4000 words) Term Paper

How Serious Are Cyber-Security Threats

The term is also referred to as information technology security that consists of the techniques used to protect computers, computer networks, programs along with data from attacks or unauthorized access that can be utilized for the exploitation of varied types.... Abomhara (2015) advises that gaining access to the systems of other governments can represent a source of national security.... As an example, the United States Intelligence Community represents a federation of sixteen separate government agencies that undertake intelligence activities in support of national security and foreign policy (Richelson, 2015)....
9 Pages (2250 words) Coursework

Security Foundation

A security domain is a model-based approach that helps companies to analyze their information security risks in a business context and provide a direct and clear mapping between the security controls that are needed to manage the risks and the risk itself (Rolf, 2008).... This paper ''security Foundation '' tells that Information is important in every organization.... This report will conduct a critical analysis of Cryptography and Application and Systems Development security to conduct related job titles (Edward, 2005)....
8 Pages (2000 words) Report

Systems Theory and Physical Security

The focus of this paper "Systems Theory and Physical security" is to discuss the systems approach to physical security and why it is necessary for the protection of assets.... System theory plays a significant role in that they offer security and can, therefore, be used to offer both safety and security (Schultz et al, 2001)....
13 Pages (3250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us