Cyber Security Issues

Superior Essays
Computer security also known as cyber security or information technology security is a extremely concerned topic in 21st century in every country and domain with increasing frequent data threats and information leakage. According to 2012 cyber attacks statistics [1] , every month, more than 70 attacks without unknown threats occurred all of the world in 2012 and in June that year, the record exceeded 120. For example, a significant hacking issue reported by BBC News online was that in 2007, American company TJX lost 45.7 million customers credit card details and those people faced with fraudulent threats for a long time [2]. However, computer security issue is more or less ignored and incomplete actions are taken [3]. In this essay, it will …show more content…
Only in the first half of 2002, more than 180,000 internet based attacks were taken in commercial area [7]. The well known attack in business happened in 2011 on Citigroup, one of the most famous credit card companies in the world, and through this issue thousands of customers lost their private information stored in company’s database including sensitive data such as e-mail addresses and postcode numbers, furthermore, these information losses would lead fraud risks for card users in the future [8]. Another example, eBay, one of the world biggest E-commerce companies, encountered a much more serious user data leakage including losing account passwords in 2013 and from eBay’s claim, 145 millions customers faced risks in their accounts, then, after this attack, eBay’s stock waved in one day from beginning decrease then back to normal finally [9]. Similarly, offline retailers could be hacked as well. Supervalu, US supermarket chain, lost its customer’s credit data after threaten in 2014. The reason of breach was still unknown and Supervalu’s stock in New York stock market fell down extremely due to data leakage.[10] Furthermore, in order to revenge, Iran attacked US banks in 2013. This threat targeted Citigroup as well and spread widely including HSBC, PNC and other big banks, as a result, all web stations they attacked collapsed [11]. Threats on business follow with information and …show more content…
For government, besides financial loss, when they are hacked, they suffered enormous damage both in facilities and in systems and their unbreakable expressions might be collapsed.And for business, as damages for their web stations, they need be rebuilt and repaired for a long time. In other words, both time and labor cost. In addition, for individuals, as their privacy are transparent without allowance, mental harm could not be ignored. Furthermore, hacking threats wastes world resources and slows down technology development. And it would lead the cyber wars in the future without controlling. Therefore, building a robust legislation system on computer security is on the timetable. Although several policies are put forward in recent years, completed and considerate regulations are needed. At last, because people need harmonious living and working surroundings, hidden harms should be forbidden and there need a proper method to use high

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Target breach ranks one of the worst ever security breaches in history. Not only did someone hack into Target’s security system, but it was during peak holiday months when Target stores are overrun with customers getting ready for the upcoming holiday. In this paper, the reader will learn about the history of cyber security attacks, the Target Security Breach in detail along with the future problems…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Data security breach occurs when unauthorized access to corporate systems is accompanied by loss of customer data, including financial data, credit card or bank account information, health data or company data such as trade secrets or intellectual property issue. Three examples are: ES Tsoft, where hackers stolen the personal information of 35 million South Koreans , RSA security in which approximately 40 million employee records were stolen and Sony’s PlayStation Network, which resulted in 77 million PlayStation Network accounts being hacked. The three companies may face attacks of spamming, phishing and social engineering, have learned about the theft afterwards and the breach would shake the customers’ confidence and the reputation of the…

    • 187 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Odds are that in one’s lifetime a consumer will be a victim of a security breach at some point. Data breaches are on the rise, and businesses need to ensure that they have sufficient security defenses in place to protect their data. Data breaches can have both direct and indirect financial consequences for a business. After a breach, businesses must resolve the problem leading to the breach, deal with the repercussions and come up with ways to limit risks in the future. When a security breach occurs in a business, it can have many negative affects on the business, such as negative press, loss of consumer loyalty, diminished brand reputation and even lawsuits.…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    In addition, checking and authorization an organization information system and how properly handle the various attacks of any type. The effects of non-government personnel such friends and family member listed on the e-Quip can later on be effected financial, religious, and emotional. Unidentified hackers were a part of the breach can possibly sell individual’s personal informati0n on the black market years down the…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    These attacks by hackers have led to the loss of large sums of money as well as exposure of records that are considered confidential. The benefits that are associated with these cyber-attacks are a major factor considered by terrorists when they are choosing their target organizations. Cyber-attacks are a major issue since they can easily go undetected for a while and the damages can prove hard to estimate. Damages related to cyber-attacks have both long term and short term effects. In the case of exposure of personal information such as patient information, the invasion of privacy might lead to stigma, depression and in extreme cases, suicide.…

    • 951 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    As the danger of cyber security increases, the desire for protection increases as well. In order to fulfill this desire, laws must be established. The creation of laws are outlined to individuals on what can or cannot be done legally. With strict laws on situations, this warns individuals on what they are able to do and if they do not follow these laws what repercussions they will then face. Likewise, technology can then help to increase the access of laws to individuals in their awareness of laws.…

    • 480 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Data breaching is the act of confidential information being releasing intentional or unintentional (Beal, n.d.). The ultimate goal of hackers when performing data breaches is to gain complete access to fully secured database or repository. Majority of data breaches occur within digital data conducted over a network with connection, like the Internet. It very common for company’s such as department stores to be vulnerable to these attacks due to the amounts of data that is stored within their systems. When these attacks on data occur many customers to companies experience a betrayal of trust within the company (Trend Micro).…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P3: Describe how software and network security can keep systems and data secure In every single large organisation, security of data and system are very important. I will describe how network security and software are able to keep the data and systems secure. I will write about alternative network security methods and software which every single company should use. I will also explain these terms to show a better understanding of how important it is ti protect data and system which an organisation is working with.…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Information Security Breach these days has been a popular subject in news. Almost every companies have been hacked, if not yet, they should not consider themselves as more secure than others that have already been there. In December 2013, Target was one of the victims with more than 40 million credit cards and debit cards that were stolen by malicious people. Just right before Thanksgiving a malware was installed inside target database.…

    • 1715 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    From 2012 -2016, Businesses – Other (BSO) industry has a total of 85% data records affected compared to any other organizations. Businesses - Retail/Merchant (BSR) were at 5%, Government (GOV) at 2%, Medical (MED) at 1%, Businesses - Financial/Insurance Services (BSF) at 7% and Education (EDU) and Non-profit (NGO) organization reveals at 0%. Even though, Education and Non-profit organization resulted at 0% that doesn’t mean that these two organizations had been spared from data breaches. Their overall data records breached were 4,207,097 and 312,462 respectively. The result was very much lower that the average were only in the range of 62,492 to 841,419 compared to other organization’s million average of data records being breached in the last five years.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays