Cyber Security

Superior Essays
Carter Maner
Christine Capen
English 3
18 December 2017
Importance of Cyber Security and Safety It is something that threatens us on a national and a more personal level. There are many precautions one can take to prevent breaches. Yet many people ignore this and argue much bigger concerns. Cyber security is a growing danger that must be addressed, because it threatens our national security and our personal security. Cyber security is the state of being protected and taking precautions against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. In the words of Lord, Nate “It is a process/practice to help defend data from attackers.” (Lord, Nate. “What Is Cyber Security?”). Our nation's government is constantly under attack. The hackers and programs that are running these attacks are trying to get into the system and have access to healthcare information, social security numbers and even military information. They have many ways of doing these things, such as, phishing/hooks, digital spying, malware and the list goes of forever.
…show more content…
They say that we should be putting more time, energy and money into these more important things. Many people are wasting a lot of time and resources complaining on the fact that we elected President Donald J. Trump who was a previous businessman and television personality. Many people are also wasting a lot of time, money and resources on the LGBT controversy. According to Jared Polis “Today, lesbian, gay, bisexual, and transgender (LGBT) people are denied many of the basic rights that most Americans enjoy” (Polis, Jared. “LGBT Equality & Civil Rights.”). When in actuality, most people do not care, especially when they do not care especially when they do not make a big deal out of

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Triton Multi-INT

    • 505 Words
    • 3 Pages

    I am a little concern about the bidding or proposal against RMF effort. There is tremendous work need to be done for the RMF compliance that leading to an ATO. Without the ATO, even your system is built with the state-of-the-art technology, you are not allow to operate in the field. I do not see that importance reflect on the proposal. I am not sure whether Triton Multi-INT (or the Triton baseline) is a program of record that needs an ATO or it only needs to be RMF compliance.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I agree that the comparison of the cybersecurity to the healthcare system is a great analogy, although not perfect. Professor provided examples where a cybersecurity breach and healthcare system are similar and could be treated in a similar way to stop or prevent a different outbreak. Even though most cyber-attacks are minor, there will time when all the information gathered from those small attacks that could be formulated into recipe of a major attack. Also, you pointed out that it is important to realize that it is impossible to prevent all and any cyberattacks, and that they evolve at a fast rate.…

    • 157 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    Introduction Hacking the Healthcare System Healthcare has the highest cyber-attacks in the industry. This is only growing. Nearly half of all health care organizations have reported criminal attacks that caused a breach in their systems (Goodman, 2015). These hackers are gaining access to the electronic health information. Identification, banking information, and pharmacies used are just some of the data that these online hackers are getting their hands on.…

    • 1225 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Some organizations still use outdated machines because they cannot afford to upgrade. It is not in their budget, so Microsoft systems that run 2003??? May still be infected with the Conficker virus. Conficker affected Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems. It then patched the “hole” at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012).…

    • 1330 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    The Civil Rights Movement

    • 1763 Words
    • 8 Pages

    Even till this day, the LGBTQ community are still fighting for their rights. In American Government and Politics Today, it states, “To a great extent, lesbian and gay groups have succeeded in changing public opinion – and state and local laws that pertain to their status and rights. Nevertheless, they continue to struggle against age-old biases against homosexuality, often rooted in deeply held religious beliefs…” As a result, the LGBTQ community has since been a group marginalized for who they are in which contradicts what the nations core values…

    • 1763 Words
    • 8 Pages
    Superior Essays
  • Superior Essays

    The government must fulfill its constitutional duties and the people must allow it. Why are Government Regulations Needed The severity of a cyber attack ranges from an individual bases to a national or even a global level. We face a dangerous future knowing that it 's possible to have…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Technology is a really interesting sector. The way how each technology works; how they differ, how they common with each other is really interesting. I find it quirky and astonishing. It is so complex that not everyone can use it easily thus it is challenging. This could be one of the reasons why I would like to study cyber security.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber Security Case Study

    • 1322 Words
    • 5 Pages

    America’s Cyber Security is at Risk The FBI is going too far, they are not just trying to get into the San Bernardino shooters phone but they are trying to take control and survey private technology. This case is a lot more than what it seems, this argument is about the privacy of information of the American people. If they create the backdoor to the iPhone it would be the same as a master key to a certain kind of door, and why should they be trusted with that power.…

    • 1322 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays