What Is Cyber Security?

Better Essays
Running head: Technology and Cyber-security

Technology and Cyber-security 7

Technology and Cyber-security

Name:
Institution:
Course:
Tutor:
Date:

Introduction
Cyber security has become a serious trade-off, a tag of war technical war between the defender and the attack. The vast changes in technology affect both; defenders are using technology to fend off attackers, and attackers employing the same technology to get away with the defenders? scope of defection. In the present digital world, data processing rules. Safeguarding of data has not been given the attention it deserves with important data getting away with unauthorized people.
Data and intellectual property safety and security is very important for an individual and
…show more content…
These are professionally organized groups which maliciously hack into systems for online money grabbing. This is a major security concern as these groups manage to get away with passwords and other credentials which enable them to steal from online money baking systems. Another security issue includes the hacktivists for instance the infamous anonymous group (Singer & Friedman, 2014). The hacking game has been taken to another level as politically motivated information systems hackers are now doing it in the open and is being acknowledged and accepted as a form of political activism. Political hacktivism is therefore posing serious threat to the security in IT industry as victims feel the monetary pain to forceful compelling to certain political affiliations (Shoemaker & Sigler, …show more content…
They much occur when system hackers exploit employees through scams and social engineering. With the sophistication and advancement in technology, hackers are becoming more sophisticated also at searching for loopholes and crack in corporate security systems and can easily gain access to protected files and data, staging a noble cyber security threat. Spear phishing is also a major security concern to the It industry (Shoemaker & Sigler, 2014). As opposed to regular phishing emails that randomly target people, victims who normally sphere head spear phishing scams are by all means looking for profitable business or private information to earn them money. Spear phishing occurs when malicious hackers target employees via emails that may appear conversant and by so doing gain access and steal personal information. With increased technology in the present world, hackers find it easier to send malicious emails to employees disguising as colleagues hence end up getting crucial information (Singer & Friedman,

Related Documents

  • Decent Essays

    Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects.…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Crime is a malicious activity including the illegally receiving data, system interferences that compromises network and integrity and availability and copyright infringements. In other words, Cyber Crime is an illegal activity performed with the help of a computer system. It was started with hackers trying to break into computer networks. Some did it for thrill of accessing high level security networks, but others have quest to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdown on personal and business.…

    • 1830 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Dangers Of Cybercrime

    • 997 Words
    • 4 Pages

    The Dangers of Cybercrime The impact of technology and networks on our lives, culture, and society will continue to increase. The advancement in technology has also led to the growth of cyber-attacks. As with most crimes that are committed, money seems to remain a major motivator. Most cyber criminals or hackers feel a little more secure when they can hide behind a network; the perception of low risk and very high financial reward prompts many cyber criminals to engage in malware, phishing, identity theft, and fraudulent money request attacks. The United States must take Cyberattacks more seriously, we should educate businesses and individuals to help prevent attacks before they begin, we should get international police involved with cyberattacks,…

    • 997 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    A tool that many of the hackers are now armed with, is the use of social engineering techniques that are luring people to websites that are full of malware and many types of spy wear. (Howarth). An acritical for SecureWorld put it this way “You can have the very best security tools and programs in place using state-of-the-art computer systems, yet all it takes is just one click to bring it all down” (Cybersecurity). This is the reality that we live in today; that we have to be extra cause on what we click and double check who. To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher).…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Human fear is a symbol that people all over the globe are being greatly concerned of why terrorism is occurring and is characterized by the influences of using many forms of terrorism such as hacking Government facilities. In the past, terrorism has been compared with how the government works and has control over power. If terrorists get too carried away, then the government will use the power to hurt society and kill innocent people. There is no actual definition of…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Hackers Threat Analysis

    • 1037 Words
    • 5 Pages

    Introduction To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame, revenge, and personal thrills. Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and employees.…

    • 1037 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    The article Why Computer Talents Become Computer Hackers, by Xu Zhengchuan, gives a definition of what titles the “good” and “bad” hackers mean; “White hats are on a quest for knowledge, discovering and alerting security weaknesses in organizational systems and developing better, more secure computer systems; Black Hats go for revenge, sabotage, or outright criminal gain (such as to steal money, products, or services) (Zhengchuan 65).” Zero Days portrays these hackers as extremely dangerous individuals that work for their own profit. With these clear definitions, viewers can understand which of the two types of hackers are more dangerous. When interviewing subjects, the director never reveals to the viewer whether the hacker is White or Black Hat. This leaves the audience wondering which of the people they are looking at are criminals. These fears of the unknown plays into the vulnerability people feel when they are on the web.…

    • 1542 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Now the question is, how do you think like a hacker? Obviously, before you can build a highly secure system, you must know the principle behind the system and all the possible ways to break them down. Hopefully, we are making some points. However, if you are still perplexed, we encourage you to read the following paragraphs more than once. Think like a hacker Undoubtedly, hacking is a very lucrative business and one of the highly sought profession in the technology industry.…

    • 803 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Hacktivism Analysis

    • 1372 Words
    • 6 Pages

    Emile Durkheim 's theory which implies that crime serves a function in society. Crime is a very potent way to bring in acts of social change. Which is why hacktivism is such a big part of the computer hacking realm. Most computer hacking attacks are the cause of the governmental secrecy and human rights violation involving people from all over the world inside and outside of the interwebs. When a collective of society challenges the social norms by committing crime,such as these hacktivism groups.…

    • 1372 Words
    • 6 Pages
    Decent Essays