Essay On Cybersecurity

Improved Essays
Cybersecurity is a big deal in today’s world. People are scared that their personal and confidential information will be hacked and they will lost it. Companies try to prevent security breaches, but there is only so much that they can do. Even the government is trying to stop it. However, the hackers are always a step ahead of us. Is there a way to stop the hackers? Cybersecurity, as known as Computer Security, is the “method of protecting information, computer programs, and other computer system assets (“Computer Security”).” However, today is not only computers. According to my friend, Alex Cormier, who works at MassMutual in their IT department, all electronics are vulnerable to attacks. “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”.
Cybersecurity is used to stop the hackers, but it does not work all the time. “Thieves using computers can rob banks and steal corporate trade secrets from the other side of the world (Flamini 157).” They can take down government and business websites within minutes (Flamini 157). Cyberwarfare is becoming huge because the technology
…show more content…
So what can you do to be safe on the Internet? Cormier states that there is many things to do to be safe. One of them is to add a Dual/Multi-factor authentication too your accounts. “The most used Dual Factor authentication choice you see is the text message. For your account, it will ask you for your password, and then after your password, it would send you a text message to a phone number that you already setup on the site. You put in the code that they text you to make sure that it is you, trying to get into the site, and not a hacker that might be using your password

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Supervalu Cyber Attacks

    • 208 Words
    • 1 Pages

    SuperValu was attacked between June and July, and suffered another malware attack between late August and September. The first theft included customer and payment card information from some of its Cub Foods, Farm Fresh, Shop ‘n Save, and Shoppers stores. The second attack reportedly involved only payment card data. I believe cyber attacks are way too easy to do nowadays, because companies don't think it can happen to them so they don't prep for it. SuperValu and all these other companies that got hacked later in the years should have had better security than the companies that were hacked at the beginning.…

    • 208 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The Target breach ranks one of the worst ever security breaches in history. Not only did someone hack into Target’s security system, but it was during peak holiday months when Target stores are overrun with customers getting ready for the upcoming holiday. In this paper, the reader will learn about the history of cyber security attacks, the Target Security Breach in detail along with the future problems…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This lets you know you’re on a secure and legit page that will protect all your information. Also do not make purchases from websites that advertise the ‘too good to be true’ specials. These websites are usually scams that make you enter your information and then say something like ‘sorry, this webpage is unavailable’ or something to that effect. Never make purchases from a site that you’ve never been on. Although everything may seem legit, it can be just a hacker’s website to trick you into putting all your information on the page.…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Data security breach occurs when unauthorized access to corporate systems is accompanied by loss of customer data, including financial data, credit card or bank account information, health data or company data such as trade secrets or intellectual property issue. Three examples are: ES Tsoft, where hackers stolen the personal information of 35 million South Koreans , RSA security in which approximately 40 million employee records were stolen and Sony’s PlayStation Network, which resulted in 77 million PlayStation Network accounts being hacked. The three companies may face attacks of spamming, phishing and social engineering, have learned about the theft afterwards and the breach would shake the customers’ confidence and the reputation of the…

    • 187 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    It’s great that each day technology is taking new phases and flourishing its potentiality, but the advancing field is also becoming a growing opportunity for invaders to breach security. By the time you recognize the attack, damage is already done, leaving you with nothing but an infected system. To prevent potential data injury, you need to be quick and proactive. Here are few steps that can help offset the deadly…

    • 409 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Dos Attack Research Paper

    • 580 Words
    • 3 Pages

    The danger for the average computer user is that someone will hack their system. Most average computer users don’t have anything worth stealing. Now, on the internet, there are other dangers, because your computer could be a launching pad for other attacks. So people might want to break into your computer in order to use it later on as a tool to break into something bigger. These things happen all the time.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays