Cyber Security Threats

Improved Essays
October is the designated "National Cybersecurity Awareness Month," in the United States and Canada, to educate and engage the community, from government agencies, private enterprise to external audiences, about the need to protect against emerging cyber threats. Today, we need to use Internet more than ever, to do everything from shopping, banking, to socializing, and in this interconnected world, we are constantly sharing sensitive information, which cyber criminals are always on the lookout for. Cyber threats are continually improving in sophistication and advancing capabilities, from both state and non-state actors, therefore everyone has to be increasingly diligent, vigilant and aware of the consequences of their online activities. No matter where or what device we are connecting from, our choices can enable or prevent cyber intrusions.

In a cyber security strategy, people may be the weakest link but they can be continually educated to be cyber aware by following simple steps in their daily activities to
…show more content…
For many employees in an organization, security processes may be a new domain, they may struggle with understanding and therefore employing. Security teams have to explain in easy to understand, layman terms the need for such security measures to create awareness and strengthen them.
Training
Security training should be an ongoing process and not a one off thing annually. Security measures require reinforcement and constant testing. Computer-based Training is a tool to help employees comprehend the security processes and to improve skillset among everyone for reinforcing positive security practices. Training should encompass online, live presentations and published materials. Training should preferably be in short but multiple, lively sessions, to get the message across without being boring.
Personal

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Knowledge Retention The Bay does mandatory yearly training sessions for all of it employees. These Training sessions are conducted via the training site developed by the Bay. The site is renewed with new features to meet the current challenges and policy changes. Knowledge is retained through keeping employees for a long time.…

    • 2357 Words
    • 10 Pages
    Improved Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    "The issue of the internet, and thusly, of cyber security and cyber ethics has, in recent years, far surpassed the status of a simple political talking point and become an issue that an enormous majority of Americans hold near and dear to their hearts. The internet has grown to be far more than a simple diversion, but has escalated to a fundamental part of everyday life, connecting people, whether over great distances or mere meters away, with a speed and convenience unlike anything that has ever been seen before. However, with this speed and convenience comes its own set of challenges as well as benefits. The ease of communication that the internet brings can serve to expose the more visceral and despicable among us from behind the veil…

    • 630 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    computer networks. In 2010, it was discovered that there were more than 75,000 computers hacked in one of the largest cyberattacks that happened to the U.S. and the around the world (Nakashima, 2010). Apparently, this attack had targeted in corporate data, emails, credit card information, and login credentials in health and technology industries. That’s why in 2010 National Security, the term of “cyber” and the initial concern to build up a strategy to secure cyberspace when Barack Obama was elected president. As the document states, cybersecurity threats is considered as the “most serious national security, public safety, and economic challenges we face as a nation” (Obama, 2010).…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    I Deserve A Raise Essay

    • 1334 Words
    • 6 Pages

    The first training program focuses on ensuring all positions at our branch have backups identified and fully trained. The second training program focuses on process improvement within our other branches. This program will allow…

    • 1334 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Background Information Crowdsourcing information security uses the reach of crowdsourcing to tackle problems involving information security and cyber security. To effectively crowdsource a task, especially in information security, three criteria must be met: • First, the crowdsourcing task must be solvable by a large group. • Second, the requester must have access to a large group of people that work either collaboratively or independently toward a solution. • Third, the requester needs to attract these people to engage in a crowdsourcing task via an open call (Hetmank, 2014).…

    • 1293 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    • Training and education: Lastly, training and education is an important step in many ways. The highly secured policies will not be effective if no one knows them or understands them clearly. Moreover, employees and partners may meet various problems and violations only because they are not guide and educate how to use the security application and device correctly. Through training and education, the awareness of BYOD security threats that are facilitated by unconsciousness or negligence of employees and partners can be raised.…

    • 1311 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Moving Target Defense The current cybersecurity environment is based around a static defense that has been employed for the past few years to protect information systems (See Figure 6). Unfortunately, this cybersecurity paradigm is not effective against current and future cyber threats. According to Zheng (2014), the weakness of this cybersecurity approach is its passive and reactive nature towards safeguarding information systems. Additionally, this method also allows threat actors the time they require to conduct their reconnaissance and exploit any vulnerabilities that are discovered.…

    • 1555 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Before a security manager can “sell” a strategy, the manager must first have a keen awareness of what the organization does and how security fits into it. The security manager must fully understand the organizational mission and what processes within the organization are needed to accomplish the mission. The security manager must be able to identify organizational assets, liabilities and threats. The vulnerability of system processes are identified and rated on a scale as to likelihood. Conducting a proper risk assessment which focuses efforts on the greatest hazards will help mitigate the confrontation of risks which threatens an organization’s survival.…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    IT Security Policy

    • 1073 Words
    • 4 Pages

    A cybersecurity policy is critical to the safety of an organization. A policy establishes guidelines for an organization, and makes expectations clear for every employee of the organization. It is important that these guidelines are clear, and concise. This helps and end user understand what is expected out of them, and what they should expect from their IT security department. When building a cybersecurity policy one must keep in mind any potential situations and address them in the policy (Easttom, 2012).…

    • 1073 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Misapplied skill sets can contribute to unique security vulnerabilities which often exposes stakeholders to higher levels security risks. The industry also is filled with training courses for each sub-trade. These courses often last days or weeks; and can be taken online in most cases. The detractor associated with training courses is that they do not take the place of experience that is gained through industry exposure.…

    • 1393 Words
    • 6 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Superior Essays

    Information security has arguably been around for centuries. Around the fifth century BC, the time of Herodotus, information was secured by shaving the head of a slave, tattooing a message, and before the slave was given orders to deliver the message, the hair was allowed to grow back, thus concealing the message and having rudimentary information security (Patterson, 2010). This ancient method of protecting information is highlighted to articulate information security methods are in need of constant revisions to protect information from new threats. According to Taluja and Dua (2012), information security methods are in need of constant revision to combat both new and upcoming threats. These new threats arise in different forms derived from…

    • 1096 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Network Security

    • 782 Words
    • 4 Pages

    Neglecting the human or technological aspect of network security can provide attackers with a vulnerable area to focus their attacks. ITProPortal.com states, “Statistically, we see that machine-driven security coupled with appropriate end-user engagement at the moment of threat identification reduced security professionals’ operational workloads by nearly 90%.” Network security is an absolute necessity and the use of firewalls, anti-malware, intrusion detection and prevention systems, network access control, and 2FA are all technology solutions that can provide high levels of network security when deployed and maintained correctly. Security conscious users are the final key to ensuring the most secure network possible in order to greatly reduce the potential for security…

    • 782 Words
    • 4 Pages
    Improved Essays