preview

The Threat Of Cyber Security

Better Essays

Internet use has skyrocketed since 2000 to over 2.4 billion users worldwide, with 70% of those users logging on every day (The Culturist, 2013).These days it takes merely minutes for news to travel around the globe. Our airwaves are filled with tiny nuggets of information whooshing past us undetected; that is, until it is detected. In the 21st century, cyber security is an international issue. The threat of cyber warfare is very real and would be devastating beyond any conventional weapon imaginable. With the entire globe becoming more interconnected, an attack on online infrastructure could ground airplanes, control information access, hijack nuclear facilities, and perhaps most terrifyingly, bring the global economy to a …show more content…

From 1997 to 2012, households with internet grew from 18% to 74.8%, where 94.8% of households with computers use it to connect to the interne (U.S. Census. 2014). Computers are not the only source of hardware connection to the internet. Other hardware such as gaming consoles, smart phones, laptops, and tablets are also connecting to the internet as well. Smart phone use for internet connectivity is popular among all age groups 25 and older with 45.3% usage. Among the heaviest users were age groups 25-34 at 88.1% (U.S. Census. 2014). With the growing use of the internet, the nation depends on a safe and stable cyberspace infrastructure for economic prosperity and more importantly, national security.

Cyber security: What is it and why is it important? Cyber security generally refers to computer security or IT Security and is applicable to computers, smartphones, the internet and public/private computer networks. ?The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction, [? and] natural disasters (Computer Security). The National Institute on Standards and Technology issued a forty-one page report on cyber security that outlines a frame work for organizations to recognize and defend against threats. The report provides a frame work that has five functions that go with a set of

Get Access