Cyber Security Failure

Good Essays
The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack.
The Failure of Cyber Security Systems Humans
Executive Summery
Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want. “Only amateurs attack machines, professionals target people” (Gallagher)

Introduction
With cyberwarfare becoming a huge part of how nations and terror groups are
…show more content…
A tool that many of the hackers are now armed with, is the use of social engineering techniques that are luring people to websites that are full of malware and many types of spy wear. (Howarth). An acritical for SecureWorld put it this way “You can have the very best security tools and programs in place using state-of-the-art computer systems, yet all it takes is just one click to bring it all down” (Cybersecurity). This is the reality that we live in today; that we have to be extra cause on what we click and double check who. To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher). These attacks can come in any shape or form over the internet and with the little regulation over cyber threats internationally it needs to be a constant cause for alarm for agents. Verizon showed its 2013 data breach investigation report that 95 percent of the advance attacks came through emails that were containing malicious attachments which gave the attackers a a stepping stone into the host networks computers and network devises which then exposed the valuable and/or private …show more content…
The Pentagon I has seen this that with the changing times that they need to put in places masseurs that would be able to counter acts of hackers. One way that they are using to counter the hackers is a use the idea of a Forceful backup. The idea behind Forceful backups is that in order to do anything that would be deemed high value in order to access it, it must be performed by two officials. This is a great idea that we could implant in the protection of our most secure servers. By needing to high up Agents we would be able to secure and watch over the use of sensitive information

Related Documents

  • Decent Essays

    Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects.…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    They much occur when system hackers exploit employees through scams and social engineering. With the sophistication and advancement in technology, hackers are becoming more sophisticated also at searching for loopholes and crack in corporate security systems and can easily gain access to protected files and data, staging a noble cyber security threat. Spear phishing is also a major security concern to the It industry (Shoemaker & Sigler, 2014). As opposed to regular phishing emails that randomly target people, victims who normally sphere head spear phishing scams are by all means looking for profitable business or private information to earn them money. Spear phishing occurs when malicious hackers target employees via emails that may appear conversant and by so doing gain access and steal personal information.…

    • 1268 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Using cyber terrorism is a serious crime and should be stopped. The CIA group keeps track of this happening daily to stop people from hacking others email addresses or passwords. (csciwww.etsu.edu) More types of terrorism are: state sponsored, anti state, international, and domestic. They all involve with finding out information secretly by using terrorists groups. But terrorists focus on one part of a country at a time.…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Terrorism is defined as an attack that targets the information held in computers, or a network that leads to a threat of violence against the property or a person (Weimann, 2004). The information that has been exposed on WikiLeaks has damaged careers and the reputation of organizations. These leaks have also exposed information that threaten the relationships of countries. The breaches can be considered acts of Cyber Terrorism, and understanding how to safe guard all organization from these threats is vital. The Reason behind the Breaches WikiLeaks has released information that has damaged many reputations, including organizations and countries.…

    • 723 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    During this phase, the social networking and phishing emails are used to intrude into an organization’s network. Deerman (2012) shares that the phishing emails are: • Highly focused with attacks embedded as part of the email • Targets individuals with elevated access within the organization • Malicious attachments are in the emails for users to click so the infectious code can install the malware The third phase is the infiltration phase. Once the network has been infiltrated, a connection between the installed malware and the compromised system will be controlled by the attacker on a Command & Control (C2) server. Deerman (2012) explains that though the C2 connections may only last a short while and only connect to a single system, it can still achieve gaining privileged access to the system, updating and installing utilities to collect necessary information, spreading the infection in the network, and more. From the defensive perspective, there are also three phases to ensure security.…

    • 1603 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Balboni was responsible for SB 1627, which legally defines cyber terrorism in New York and also making it a Class B felony to initiate a cyber attack on any local, state or federal government computer network (Boulard & Goodwin, 2003, 1). As well as creating the legislature, public officials are creating back-up systems for their databases and information in case of a cyber attack. This is one of the best ways to thwart any cyber activity: by always staying one step ahead of the hackers (Kemp, 2012,…

    • 1252 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Wisdom is supreme; therefore get wisdom. Though it cost all you have, get understanding” (New International Version). Therefore, it is imperative that one is fervently aware of the intrusions that can occur online. Internet users must take preventive measures against surveillance and online hackers. Thus, each individual must take the time to set up a computer firewall, antivirus software and security settings for each personal computer, social media site and email subscription they have.…

    • 1466 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Hackers Threat Analysis

    • 1037 Words
    • 5 Pages

    Introduction To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame, revenge, and personal thrills. Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and employees.…

    • 1037 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    However, the hackers are always a step ahead of us. Is there a way to stop the hackers? Cybersecurity, as known as Computer Security, is the “method of protecting information, computer programs, and other computer system assets (“Computer Security”).” However, today is not only computers. According to my friend, Alex Cormier, who works at MassMutual in their IT department, all electronics are vulnerable to attacks. “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”.…

    • 1115 Words
    • 5 Pages
    Decent Essays