Cybersecurity Research Paper

Decent Essays
As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues. Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Punishments for cyber terrorists should be determined based on the severity of the crime, considering the protocol normally used when handling terrorists. However, we believe that the biggest shift in how governments deal with the issue of cyber terrorism should come from the resources spent on preventative measures. The only way we will be able to combat the source of the problem is by investing in secure networks for government systems and routinely checking the security of sensitive information to prevent leaks and other harmful threats to…

    • 1116 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    In this new generation computers are becoming more of a necessity. On the World Wide Web there are all kinds of obstacles people are faced with that can lead to favorable or vicious consequences. Hacking is steadily growing as a worry for many and this is why the United States has to slow it down at any cost. With identities, financial accounts and other private information being stolen daily, people are looking towards the government for protection.…

    • 1580 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    Running head: Technology and Cyber-security Technology and Cyber-security 7 Technology and Cyber-security Name: Institution: Course: Tutor: Date: Introduction Cyber security has become a serious trade-off, a tag of war technical war between the defender and the attack. The vast changes in technology affect both; defenders are using technology to fend off attackers, and attackers employing the same technology to get away with the defenders?…

    • 1268 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cyber crime presents itself as an arduous task to solve given the dynamics of cyber space. Even though cyber security and culture began to take form around the same time as cyber crime, cyber crime is advancing much quicker, which creates a multitude of problems…

    • 1096 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    The purpose of this paper is to discuss the potential risk of connecting any computer to World Wide Web or any network. With they’re being many threats such as hackers and malicious virus’s; attacks are going to happen whether you’re an organization or just an online shopper. In this day and age it is more often that a security breach is most likely to happen on a personal computer than at a company because the home user is not as secure and the average user is not as “computer savvy”. With that being the case, by the end of this paper I hope to show the end-user simple techniques to help secure their network. Starting with the first step the router, many people use it as the instructions say, “plug and play”.…

    • 808 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    These days Internet has made it easier to send and receive accurate data from any destination, which is a rapid development. There are different transmission media to transfer the data to destination such as social sites, emails, file sharing sites, etc. Also, it might be easier to modify and misuse the significant data by hacking. There are many approaches to transfer the data securely to the destination without any modifications like cryptography and steganography.…

    • 1064 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    As the world of technology advances and new technology comes out. Individuals need to know of the risks and the threats that are out there. Computers are a great piece to have with you, but you can’t become ignorant in the world of the internet. Individuals will be using the internet to check out different websites, do their shopping online, and some will be doing their banking online.…

    • 1113 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Internet’s running system is underpinned by the protocols of Transmission Control Protocol (TCP) and Internet protocol (IP). Information can be transmitted through several routers to ensure reliability and performance .The TCIP dissembles this information into smaller chunks of information known as packets, for the purpose of efficient delivery and to reduce the vulnerability of threats. (Mowery & Simcoe, 2011). The information is then reassembled and delivered once the address corresponds to the computers individualised IP address, securing the correct delivery of information.…

    • 792 Words
    • 4 Pages
    Improved Essays