Cyber Security Threats Essay

Decent Essays
Summary

Some of the difficulties facing large corporations in this technology driven

modern age are cyber attacks and data breaches. Recently, we have witnessed

security breaches in high-profile companies like Sony Pictures Entertainment,

Home Depot, Target, and EBay, in which all of these organizations have lost

confidential data like personal records, and financial information. To counter

these attacks companies invest a lot of money on insurance to cover any issues

with confidential data, but ever since all of these high-profile companies have

been attacked the insurance rates are on the rise. According to Retuers report,

“Insurers are raising deductibles and in some cases limiting the amount of

coverage to $100 million.”
…show more content…
Similar attacks in 2013 cost Target and Home Depot nearly 230

million in expense, but insurance only covered up to 100 million. The question

then becomes how can companies prevent and identify such malicious attacks

that not only end up costing them millions, but also time and reputation? It’s my

educating the end users on cyber security and threats.

Identifying Threats

There are three computer security types. First is Computer security, the

application of hardware and software security features to a computer system,

and it’s associated with one of the most common security threats that affect the

business computers, malware. Malware contains viruses, trojans, and worms,

and it is distributed through mediums such as e-mail attachments, HTTP links,

removable storage, and remote login connections. Most malware make software

programs unusable or destroy the data itself, and they operate subtly and rapidly

spread until damage has already affected computers and is unrecoverable.

Second is information security, the protection of information against

unauthorized disclosures, transfer, and modification, or destruction, weather

accidental or intentional. Some threats in information security comes as
…show more content…
Preventive Measures

System security experts have developed many methods to protect

computers to fight off common security threats. One example is virus protection

software, which prevents intrusions in the computer. Security software is widely

available to general consumers and businesses, and includes with corporate

licensing, but needs to be updated on the regular basis. Another effective

preventive measure from the outside unauthorized intruders is the use of firewall.

Firewall is a type of a hardware security device that is installed in between the

internet and a computer network; It’s main purpose is to act like a routing traffic

controller and block any external usage that is not authorized. One program that

works complementary to the firewall is an encryption program. The encryption

program assists in protecting data by scrambling it, and could only be accessed

with an encryption key. The most effective measure is integrating enforcing

policies, and security procedures. All of these high-profile organizations that

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Web server A web server processes requests using HTTP, the most basic network protocol used for information on the World Wide Web. HTML is the most frequent protocol for WWW and it may include images, scripts and style sheets in addition to text content. A user agent (eg. a browser) communicates by requesting a specific set of data using HTTP.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    ¥ 1. An IP address is an identifier for devices on a TCP/IP network. Usually, an IP address could be assigned using a 32-bit numeric address written as four numbers separated by periods. Each number can go from being zero to 255. For example, 1.160.10.240 could be an IP address.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The Cold War: How the Icy Rivalry Gave Us Fiery Technology Throughout history, we have experienced many technological influences, inventions, and innovations, many of which have changed the world and how we live in it. Our modern era depends on new, cutting-edge technology, but few look back to the origin. Some people believe that war brings new technology, since war motivates. Whether in the form of a theory, weapon, tool, or all three, the Cold War stands true to this and but this and played a major part in the advancement of our modern technological society by developing instruments for space exploration, bringing the advent of the internet, and upgrading operational capabilities of the computer.…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Security Threat Groups, also referred to as gangs are either an formal or informal group of prison inmates who set up either by race or by their beliefs. The evolution of gangs have developed a threat to the safety of prison officials and other inmates. Some of the major security threat groups include the Aryan Brotherhood, The Klu Klux Klan, The Folks, The Nation of Islam, and MS13. Groups within the correctional facilities are categorized as STGs depending upon parameters such as gang history, purpose, involvement in illegal activities, propensity for violence, and its structure and composition.…

    • 2127 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    When the alarm clock goes off in the morning, your first thought is usually “Is it time already?” You roll out of bed and start the process of your morning routines, for most people the thought of not making it home after class never enters the mind. You are going to be in a classroom, on a campus that has security, you have the assumption you are safe. The problem is, you are not. An individual should never rely on someone else to keep them safe, every person has a right to protect themselves.…

    • 1075 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    To Whom It Concerns, Recently through my own experiences and talking to people I have discovered an interest in Cyber School. After conducting a thorough research I was able to come across SusQ- Cyber Charter School. After reading the school’s mission statement, belief system, and handbook I have come to a decision. SusQ- Cyber Charter School not only helps students, but helps them excel in classes, and helps the student if they are lacking.…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Technology is a really interesting sector. The way how each technology works; how they differ, how they common with each other is really interesting. I find it quirky and astonishing. It is so complex that not everyone can use it easily thus it is challenging. This could be one of the reasons why I would like to study cyber security.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays