Essay On Cybersecurity

Improved Essays
Cybersecurity is a big deal in today’s world. People are scared that their personal and confidential information will be hacked and they will lost it. Companies try to prevent security breaches, but there is only so much that they can do. Even the government is trying to stop it. However, the hackers are always a step ahead of us. Is there a way to stop the hackers? Cybersecurity, as known as Computer Security, is the “method of protecting information, computer programs, and other computer system assets (“Computer Security”).” However, today is not only computers. According to my friend, Alex Cormier, who works at MassMutual in their IT department, all electronics are vulnerable to attacks. “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”.
Cybersecurity is used to stop the hackers, but it does not work all the time. “Thieves using computers can rob banks and steal corporate trade secrets from the other side of the world (Flamini 157).” They can take down government and business websites within minutes (Flamini 157). Cyberwarfare is becoming huge because the technology
…show more content…
So what can you do to be safe on the Internet? Cormier states that there is many things to do to be safe. One of them is to add a Dual/Multi-factor authentication too your accounts. “The most used Dual Factor authentication choice you see is the text message. For your account, it will ask you for your password, and then after your password, it would send you a text message to a phone number that you already setup on the site. You put in the code that they text you to make sure that it is you, trying to get into the site, and not a hacker that might be using your password

Related Documents

  • Superior Essays

    (Littleton) One month after the attacks of 9/11, a former national security cyber terrorism expert expressed concern about the launch of a cyber attack, which would cause confusion and panic. Most recently, the “SONY” attacks by North Korea and the hijacking of the web site ‘Ashley Madison’ by the group known as The Impact Team, was an attempt to not only destroy software or equipment, but was an act of cyber terrorism used to exploit sensitive information that could be detrimental to lives of politicians, business leaders, and thousands of others. (Ellyatt) “When a U.S. military plane crashed in Chinese territory in 2003 after computer hackers attacked American systems with viruses, the academic, Dr. Alan Ryan, warned that cyber terrorism was the way of the future and the nation’s security experts would have to focus their attention on the problem.” (Murrill) In response to the undeniable fact that cyber terrorism is a relevant and dangerous threat, President Barrack Obama bolstered cyber terrorism defense. Today a “cyber war” is taking place. Government agencies and corporations have tripled the hiring of cyber security experts, and the field is one of the fastest growing and in- demand areas of the global workforce. (UBLS) The U.S. military has created a specialized task force within U.S. Cyber Command, pulling personnel from all branches of…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks. In the year 2008, the Comprehensive National Cybersecurity Initiative (CNCI) was formed and it was to ensure the US is able to defend itself from immediate threats should they occur and to be able to educate the government.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections . Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65). He also adds, “Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb” (Pollit, 2007, 66). It is a haunting thought to know that terrorist attacks are taking place behind a computer screen. The fact that cyber terrorism can happen without anyone knowing gives these hackers and terrorist groups an advantage over authorities (Pollitt, 2007,…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    The severity of a cyber attack ranges from an individual bases to a national or even a global level. We face a dangerous future knowing that it 's possible to have…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages. One of the first attacks of cyber terrorism was in the early 1980s during the phase of the cold war, where CIA implemented a backdoor virus which is commonly referred as “Logic Bomb” in the Siberian pipelines.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    I have seen a lot of things occur in my career. The one I see more and more of is cyber activities. When I entered the military I had never touched a computer with any seriousness before. I didn’t know the basis of how to use one, I remember sitting there in the office, and a Lieutenant taught me how to change the screen saver. Now, computers are a part of everyday life; we shop on them, talk on them, bank on them I could go on an on. Computers are woven in every aspect of the government, and the lives of all Americans.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    Individuals question what kind of response a 200-year-old government can provide to modern-day threats. Some believe that even if Congress had the ability to adopt a utopian cybersecurity law, it would be short lived because of the endlessly evolving nature of cyberspace. Those who support private sector cybersecurity also arguing that breaches only happen because their networks are consistently being attacked. Furthermore, economic experts believe if the government enacts legislation, many of the cybersecurity professionals would leave America to seek employment in other countries (Clinton, 1). Because of these potential political, social and economic woes, government legislation could stifle innovation and financial…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, program and data from attack, damage or unauthorized access.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Moreover, there are other types of cyber-attacks and acts of cyber warfare that are not solely military and defense concentrated, but nevertheless are dangerous. An example of this type of attack is explained in columnists, DJ Summers (2014) article “Fighting in the Cyber Trenches”. In his example, he explains how an honest biomedical company going through the process of creating a new technological innovation may have to wait up to five years to be able to release a new product. On the other hand, a different company who is trying to release the same product may use a hacker to release this new product into the market in as shorter span of time for instance, as 18 months (Summers, 2014). Summers explains how hackers are able to infiltrate…

    • 230 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Supervalu Cyber Attacks

    • 208 Words
    • 1 Pages

    I believe cyber attacks are way too easy to do nowadays, because companies don't think it can happen to them so they don't prep for it. SuperValu and all these other companies that got hacked later in the years should have had better security than the companies that were hacked at the beginning.…

    • 208 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In recent years, Cyber-attacks have become a more common form of terrorism used against the United States. Cyber-terrorist have the ability to access bank accounts, shut down systems, and send malicious viruses to ordinary citizens from the comfort of their home. It may be possible for terrorist to hack into States and Federal systems, which would be catastrophic on a global level; cyber-attacks are happening more and more often than they should.…

    • 1394 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Unit 1 Assignment

    • 783 Words
    • 4 Pages

    Even after putting lot of efforts to prevent the counter attacks on Computer systems still we are standing way back. Data bleach and Computer have to compromises are still remains very common and same. In older days for our Computer system counter attack techniques most of them used to detect based on passive techniques. We use to get alerts for Computer system once after attacks have taken place.…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Everyday money is stolen, sites are hacked, and governments seek to gain an advantage over the others by using the internet. It is as if there is a war going on behind the scenes of the internet. A new battlefield erupted in cyber-space. Cyber-warfare is what this called. In Cyber-Warfare not only are vital secrets compromised, but complex systems can be, and have been attacked that put peoples life in danger. Because of the dangers we face, in the cyber-space steps need to be taken in order to protect out lively-hood, safety,…

    • 1383 Words
    • 6 Pages
    Great Essays