IT3006 Develop a Tentative Problem Statement (Unit 2 study)
Tentative Problem Statement
The world of cyber security continues to introduce new threats each year against network infrastructures and computer devices. In the recent years, the impact from cyber-attacks has wreaked havoc on many company brands and organizational reputations. As this issue grows so does the technology to prevent and protect against these malicious attacks. It is absolutely crucial for organizations and businesses to shift focus from defense for different types of attacks to improving safeguards to mitigate the loss of sensitive data when an attack occurs. In addition to the traditional security technology used to detect an attack, companies will have to include
Improper ethical decisions may be the cause of the failure, and as relate to my three behaviors for personal "code of ethics".
We have all herd of security breaches on corporate servers that has exposed personal and important information that should be secure. Hackers and criminals have been doing this since the invention of the internet and has only increased along with our use and dependency on networks. It is becoming more apparent that company’s need to protect their windows and Unix/Linux servers from known or unknown shortcomings and vulnerabilities from hackers who want to steal information for malicious purposes. Hackers will use codes or malware to corrupt network or operating system of the target company, with the intent to steal information such as proprietary information, personal information including social security numbers, contact information, or any
Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem
At this stage in evolution, society cannot escape its dependence on information technology. The need to protect sensitive data will continue as long as this persists. Amazingly, a recent poll of 4,100 enterprises revealed that 70-percent didn’t have a contingency plan for cyberattacks. The firms reported that they had the resources to purchase what was needed to secure their networks, but couldn’t find trained specialists to deploy the
Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.
The availability of cheap cyber weapons has made cyber-terrorism a growing threat to the stability of America's critical infrastructures and society in general. Needless to say that cyber terrorism is a major issue for American policymakers and IT professionals. The growing threat to commercial and government entities has prompted organizations to develop effective strategies and methods to protect their resources and assets from the threat of attackers. Such strategies and methods include but are not limited to continual risk and vulnerability assessment, upgrade of software and use of tools such as encryption, firewalls and intrusion detection systems and the implementation of disaster recovery and business continuity plans in the case of a cyber incident. The following paper will offer a few basic definitions to illustrate the concept of cyber terrorism, discuss the physical and human aspects of cyber terrorism, offer assessment of the most pressing threats and the most vulnerable targets, recommend methods to combat national and international cyber terrorism. Finally, several preventative actions will be recommended for implementation. Finally, a basic checklist/template is also provided in order to better illustrate and summarize recommendations and suggestions.
We all know that cyber security is something of great importance to anyone trying to protect their network assets, customer assets, and personal assets. The list of possible risks associated with neglecting to practice good cyber security are endless, and the dangers lurking out in
In today’s vastly technological world, when it comes to internet and computer security, people are either scared or unaware of the dangers present. Everything we use in our daily lives, from devices such as phones, tablets, and computers, to cars, gas stations, and electrical plants, is run by computers. This puts millions and billions of people at risk with impending security attacks just a keystroke away. The threat of an attack or breach in a system puts information security at a premium for many organizations and individuals. Therefore the onus is on businesses and organizations to ensure the confidentiality of information in their possession. Securing information prevents breaches and cyberattacks, protects the privacy of
The purpose of his proposal is to provide inquiry and identify the best way to implement fundamental plans to individuals who wish to build and run a small business in addition to the lack of information they may bear on the importance and sustainability of protecting their networks and data against cyber-attacks.
Over the years, advancing technology has created many opportunities for the world in several aspects. However, security breaches are a major downfall with advancing technology and are causing harm to millions of people in the United States. Security breaches affect the masses. Securing company data and personal information is detrimental to millions of individuals, businesses, and governments. Millions can be spent on security software within a single company to protect against hackers. In the future, improvement of softwares may decrease the likelihood of hackers retrieving confidential information.
Computer and cybersecurity go hand in hand in today’s evolving business world; if neither of these things are done well, a business has the potential of
After the September 11 terrorist attack in the U.S, the federal government through all the law enforcement agents ensured a review of security measures across the nation. The measures mostly focused on possible threats in areas considered high risk targets for terrorists. Other than the physical locations, significant attention has of late been accorded to computer as well as telecommunication systems as a result of possible network security vulnerability (The National Academies, 2015). The need to focus on cybersecurity is attributed to the fact that much of modern life relies significantly on the use of computers as well as computer networks. The computers and networks prove critical in important functions that include management and operation of nuclear power plants, financial infrastructure, controlling the air traffic systems and power grid among others. Computers also prove essential in the management of day-to-day operations of governments and organizations. Management of payrolls, tracking of sales and
As company’s dependence on computers and the internet increase, there are more and more threats that they face from hackers and anarchist alike. For ever solution that companies come up with to defend themselves against cyber attacks, those who wish to do harm find other means to attack, it is a constant cat and mouse struggle. If 2011 has been any indication, it is clear that everyone is vulnerable to cyber attacks. There was wave after wave of hacking, malware, and spear-phishing attacks that succeeded in exploiting many well-known businesses, such as RSA and Sony, which lead to the exposure of millions of records. (Schwartz, 2012) The
The increasing volume and sophistication of cyber security threats including targeted data theft, phishing scams and other online vulnerabilities demand that we remain vigilant about securing our systems and information.
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.