Annotated Bibliography

Great Essays
ENGINEERING TECHNICAL DEFINITION PAPER
Name
Institution
Date

Annotated bibliography
Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x This article explores the benefits associated with the use of cybersecurity in day to day living. The authors focus on the reasons why many people are shifting their operations to involve use of cybersecurity. As used by the national presidential administrators, the authors of the article postulate that it is necessary to have national strategies for electronic security as a protection from intrusion. Further, the authors of the article claim that the integration of cybersecurity has
…show more content…
China uses cybersecurity as a one-step process of clearing any doubt concerning the safety and security in management of organizations. China regards the innate definition of cybersecurity as a system of management that offers maximum security within the confines of the internet. The author of the article has used a practical example of the varied developments that have taken the country to greater heights of GDP and economic growth of the individual people. He cites cybersecurity as a force that has brought such changes. The author of the article concludes by stating that cybersecurity is a relevant information system that offers security to every confidential docket within an …show more content…
As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections . Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    One of the first attacks of cyber terrorism was in the early 1980s during the phase of the cold war, where CIA implemented a backdoor virus which is commonly referred as “Logic Bomb” in the Siberian pipelines.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Gender In Cybersecurity

    • 973 Words
    • 4 Pages

    Gender Gap in Cybersecurity Cyberwarfare is now an integrated part of China’s military strategy according to the US Department of Defense. And in January 2010, Google announced that a major cyber attack from China had penetrated its corporate infrastructure and stolen information from its computers. This raises the awareness that cybersecurity have become an important role in national security. Cyber attack can be used in three major categories — economic, military and social adversaries. For example, China hacked into Gmail accounts of some human rights activists to strike social adversaries; Military concern is the most important in cybersecurity because hacking into the Pentagon can result in the leak of sensitive military deploy.…

    • 973 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity Essay

    • 778 Words
    • 4 Pages

    Innovating cybersecurity involves a lot of bureaucratic nonsense and restructuring which is more difficult for the U.S. to navigate (Sugarman, 2014). The U.S. mainly uses one agency to address issues with cybersecurity such as the National Security Agency (NSA). Washington policymakers suffer from a lack of ideas and technical know-how to understand what is needed to protect our cyber infrastructure. New forms of public-private partnerships are essential to meet the challenges posed by new technologies and non-traditional threats. Therefore it is crucial for both public and private sectors to work together because one entity cannot do this…

    • 778 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Cyber Security: The Concept Protecting ICT systems alongside their content is popularly known as cyber security. Without a doubt, the concept is both broad and fuzzy. Although useful, the term lacks a precise definition since it refers to either one or three of the following components, as elucidated by Fischer (2015): 1. A collection of activities and measures aimed at protection from attacks, disruptions, or threats to computers and their networks, related hardware and software, as well as information contained or communicated, such as software and data, in addition to aspects of cyberspace; 2. The quality or state of protection from the multiplicity of the above or related threats; and 3.…

    • 1213 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Cyber insurance is a relatively new product that is becoming more and more important because technology has become an integral part of our society and day-to-day operations. As a result, cyber coverage is available from numerous insurance providers and is fairly inexpensive to purchase. Cyber risk coverage started in the late 90’s because people believed that “Y2K” would affect the stability of computer and data systems across the globe. These policies will help the insured recover losses from the damage done by the cyber breach as well as the losses from the interruption of the company’s business operations. Businesses have bought these policies after hearing about the breaches that have occurred and the negative publicity that has resulted from them.…

    • 727 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Network security has been at the head of some stories in the news. Security is an aspect of the technology field that should be considered at all times. Not only can personal security be breached, the security of others can be affected as well. For example, the incident with the retail company Target, (Vijayan 2014) retailer 's failure to properly segregate systems handling sensitive payment card data from the rest of its network. In this paper, network segment security aspects will be discussed on why they are important, who can be affected, and what can you as a someone entering the Information Technology field do to make yourself an asset which will help your placement and skills while working.…

    • 862 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Why Cybersecurity is Important for Every Company. In today’s world, almost every single business, from small to large corporations, needs to have an online presence to grow and increase their customer base no matter what the focus area of the company is. For example, it does not matter if the company is specialized in food, clothes, insurance, car repair, phone service. In addition to having an online page, when companies grow they also need a computer network to facilitate communication between their employees, customers, and business partners, as well as to store information about the company such as customer, employee, products, and financial data.…

    • 2526 Words
    • 11 Pages
    Great Essays
  • Superior Essays

    As with the advances in computer technology, it appears that the world is experiencing a breakthrough with the massive explosion of computer usage has brought so many modern amenities to make our life easier although it raises a question about vulnerabilities in the computer infrastructure. As the matter of fact, today’s modern lives tend to rely on computers to reach a quest where machines are assigned to reduce human effort. Computer hacking is defined as a threat, which poses to security as the practice of modifying the features of computer system. The issues arising from the computer security have drawn satisfactory attention to look for a way of solution to approach the problem in recent year. This essay will outline the difficulties…

    • 1094 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    Cyber Security Threats

    • 983 Words
    • 4 Pages

    October is the designated "National Cybersecurity Awareness Month," in the United States and Canada, to educate and engage the community, from government agencies, private enterprise to external audiences, about the need to protect against emerging cyber threats. Today, we need to use Internet more than ever, to do everything from shopping, banking, to socializing, and in this interconnected world, we are constantly sharing sensitive information, which cyber criminals are always on the lookout for. Cyber threats are continually improving in sophistication and advancing capabilities, from both state and non-state actors, therefore everyone has to be increasingly diligent, vigilant and aware of the consequences of their online activities. No matter where or what device we are connecting from, our choices can enable or prevent cyber intrusions. In a cyber security strategy, people may be the weakest link but they can be continually educated to be cyber aware by following simple steps in their daily activities to…

    • 983 Words
    • 4 Pages
    Improved Essays