Tuesday, April 30, 2019
Cybersecurity Coursework Example | Topics and Well Written Essays - 2500 words
Cybersecurity - Coursework ExampleThe paper throws well-to-do on cyberspace, a mine field for seekers of info. With every interaction with websites, there would be an increasing bespeak for personal information. Such have been utilize by spiteful persons for their own gains. Air travel has been effortful hit by cyber crime and cyber-security in airports has been a challenge with each passing day. The internet has been used for various purposes which include gathering, storage, processing and transfer of vast data amounts, which include sensitive and proprietary personal, transactional and cable data. Organizations have heavily depended on computer systems for day-to-day business concernes. Even as this capability has been relied much and more by various individuals and organizations, the internet has been plagued by threats of cyber-security. The information available in the internet has been used to become threats to operations of businesses and individuals. These threats evolve with the expansion of the internet and the risks that come with it continue to grow globally. The United States of America stick to be the hardest hit by cybercrime according to the report on internet crime by way of life of Justice Assistance. There is a wide range of cyber attacks. Insider threats form the core perpetrators in computer crimes. gibe to Vatis, insiders do not need a great deal of knowledge about computer intrusions as they posses adequate knowledge on the systems which they attack which allows them to have unrestricted access to damage the system or to steal system data. ... ge about computer intrusions as they posses adequate knowledge on the systems which they attack which allows them to have unrestricted access to damage the system or to steal system data (2002, p.3). Criminal multitudes have also increasingly used cyber intrusions for monetary gains. Vatis gives an example of such a group referred to as Phonemasters who were indicted for stealing an d accessing federal interest computer and being in possession of access devices for which they were unauthorized. computer virus writers also pose a great threat to security in IT. Viruses propagate quickly because of the uplifted speed networks currently available. Anti-virus software available and being careful with attachments would go a long way in curtailing such epidemics. Other cyber attacks emanate from terrorists, hackers and information warfare. Vatis defines cyber attacks as computer-to-computer attacks carried out to steal, erase, or alter information or to destroy or impede the functionality of the target computer system (2002, p.10). These could be categorized into three, to wit unauthorized intrusions where the attacker uses hacking techniques to break into a computer or unauthorized access by an insider to procure unauthorized tasks in the network destructive worms or viruses spread through computers using forms of data supervene upon such as emails causing some parts of the network to lose functionality and denial of service attacks where a computer would be overloaded with communication thus hampering its functionality. Due to the ever increasing critical business partners connected to customers and partners on the internet, many organizations have been left exposed to cyber attacks. There is no guarantee that malicious acts or intrusions would not happen. But aviation
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment