This website uses cookies to ensure you have the best experience. Learn more

Securing Networked Computers For Global Defense

1982 words - 8 pages

Technology is a crucial component to many peoples’ lives. As it continues to advance and become widespread throughout the world, peoples’ reliance upon computers especially increases. Computers are responsible for storing and sending extremely sensitive data; the unwanted interception of this data can lead to catastrophic outcomes. Keeping sensitive data absolutely secure is impossible, but setting up defenses to optimally protect it is essential. The 2008 CSI Computer Crime & Security Survey states that when asking organizations if they had experienced targeted computer attacks that year (2008), 27 percent of 355 respondents reported they had. The previous year (2007), 32 percent of the 252 respondents said they had experienced attacks. Networked computer security defenses are implemented to protect against these targeted attacks, causing system intruders to change their focus, "…toward stealthier attacks that are more effective because they are targeting specific organizations or industry segments," (18, Richardson). Although there was a 5 percent decrease in attacks per year, there is still a significant threat of targeted attacks present in the world, "Targeted attacks—hypothetical just a handful of years ago—are a significant reality today" (18, Richardson). As the world continues converting to electronic means of storing data, it is essential that personal and private information remains protected to ensure the security, and therefore the prosperity, of individuals, businesses and governments.

All computers connected to the Internet face serious potential threats. As the Internet continues to advance, made apparent especially in the switch from web 1.0 to web 2.0, users and developers are granted more freedom in their opportunities for design. Unfortunately, while the Internet expands and these new opportunities present themselves, opportunities also pop up for some users to abuse the integrity of new systems. These users exploit the freedoms of advanced development and design attacks against others. Web 2.0 is a popular target for hackers due to the mass amount of users that are able to access it, and the possibility for various methods of intrusion. “Black hat” hackers actively attack sites for numerous reasons; the majority of their motives involve harming others for selfish gain. These attacks are organized primarily against websites that are commonly accessed by the public, such as social networking, shopping and banking sites. Hackers gravitate towards these websites in hopes of intercepting the abundant and frequent transaction of personal information. The first quarter analysis by Secure Enterprise 2.0's article, Web 2.0 Hacking Incidents & Trends' 2009, for example, "showed a steep rise in attacks against Web 2.0 sites...a major reason for the steep rise was a series of high-profile attacks on Twitter, which [was] becoming a popular social network/micropublishing site [at that time]" (2-3, Secure Enterprise...

Find Another Essay On Securing Networked Computers for Global Defense

Department of Defense Strategy for Operating in Cyberspace

2042 words - 8 pages : Old Method, New Concern. National Strategy Forum Review, Winter 2000. International Strategy for Cyberspace: Prosperity, Security and Openness in a Networked World. (2011). Retrieved from http://www.whitehouse.gov/international_strategy_for_cyberspace.pdf. National Security Strategy. (2010). Retrieved from http://www.whitehouse.gov/national_security_strategy.pdf Quadrennial Defense Review Report. (2010). Retrieved from http://www.defense.gov

Role of the National Cyberspace for American National Security

3032 words - 12 pages cyberwar was described as a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.As for how the internet was created, believe it or not, it started with a satellite. In 1957, during the Cold War when the United States and the Soviet Union were considered by one another to be enemies, the Soviet Union launched a satellite

information security

1354 words - 5 pages as smartphones and tablet computers. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.Information assuranceThe act of ensuring that

Wireless Network Technology

1921 words - 8 pages more computers. These computers are networked (Whitman, ME & Mattord, HJ 2005). Generally there is some physical medium running among the computers for their mutual connection phone wire and coaxial cable. Recently hardware has been introduced with which home users’ network computers by the electrical wiring (Vacca, JR 2006). Instead wireless technology is the simplest, easiest and cheapest way for

Security and Consumer Protection in the Information Age

3706 words - 15 pages promoted by an increasingly networked global telecommunications system. (Stromquist, 2000)." I can imagine the pure confusion caused by the mere sound of a definition such as that. Without question the concept of globalization is so far reaching that it would be hard to imagine any member of our global community who wouldn't need a minute of reflection to comprehend not only the real meaning, but the implications of this phenomena. Like it or

Computer Security

1948 words - 8 pages critical security issues, one that has been compounded by the wireless, portability and LAN/WAN revolutions, is a lack of awareness, by executives and users, to the vulnerability of their critical and sensitive information. Other threats include computer and component theft, vandalism and sabotage. Computers have unique security problems that must be understood for effective implementation of security measures. These problems include: Data

Workplace Observation - Prepare a paper in which you describe the observable aspects of your organization's culture

867 words - 3 pages networked both internally and externally (via the Internet). Securing these networked pieces is of great importance, especially when patient information is at stake. While CHHS values protecting patient information, it is also important for this information to be available to the necessary individuals.HIPAA (Health Insurance Portability and Accountability Act) is imposing regulations defining what information must be protected. Working in the area of

INDP for Riordan

3665 words - 15 pages and rebuild the network infrastructure at the new Shanghai, China production facility location.Current network setupEach department is allotted a dedicated amount of computer workstations as well as networked paraphernalia, such as printers, phones, and fax machines. It is our intent to maintain that infrastructure upon moving into the new location. The current network setup consists of the following (Riordan Manufacturing, 2013):30 Dell computers

Riordan INDP

3665 words - 15 pages and rebuild the network infrastructure at the new Shanghai, China production facility location.Current network setupEach department is allotted a dedicated amount of computer workstations as well as networked paraphernalia, such as printers, phones, and fax machines. It is our intent to maintain that infrastructure upon moving into the new location. The current network setup consists of the following (Riordan Manufacturing, 2013):30 Dell computers

The threat of internet security and its effects on electronic commerce

2078 words - 8 pages The threat of Internet security is an issue of growing concern. In the last decade, the number of people using computers on a regular basis has exploded. For quite some time now, computers and the Internet have been a source of entertainment and education, and not until recently have become a means of doing business. At the same time the Internet has also been a fertile ground for fraud. The absence of global regulation, a general lack of

Updates Over Security Software

2521 words - 10 pages dollars keeping up with attacks on computer networks. In mid-2005 a computer worm named Zotob wreaked havoc on computers owned by ABC, CNN, UPS and hundreds of other organizations. The worm spread itself by infesting networked computers looking for ones that had not been updated. Once infected Zotob caused computer to reboot, crash or slow down, leaving the computer unusable. Microsoft made the public aware of the security vulnerability and quickly

Similar Essays

Cyberspace: The Asymmetric Battlefield Of The Future

2164 words - 9 pages There is a great deal of ambiguity in cyber-attacks, which entices states, non-state actors and criminal organizations to exploit them for their benefit. Not only are they cost effective, but they offer a substantial degree of plausible deniability. A typical paradigm that is often witnessed in international relations now is when the U.S. discovers forensic computer evidence linking various hacking attempts against U.S. networks to computers

History Of Computers Essay

2191 words - 9 pages computers became more widespread in the workplace, new ways to harness their power developed. As smaller computers became more powerful, they could be linked together, or networked, to share memory space, software, information, and be able to communicate with each other. As opposed to a mainframe computer called a server, which was one powerful computer that shared time with many terminals for many applications, networked computers allowed

Cisco Systems Business Strategy Essay

9630 words - 39 pages computers, Cisco has been noted as being the company to grow most rapidly and is continually the industry's market leader. In order to determine a future strategic alternative for Cisco, it is essential to look at the few characteristics of the company. The broad environment consists of domestic and global environmental forces such as socio-cultural, technological, political, and economic trends. The broad environment constitutes the background

The Microsoft Baseline Analyzer Essay

1175 words - 5 pages large corporations (Hacked veed). The Conflicker worm targeted Windows computers using blended attack methods to initially infect networked systems by conducting “low-risk” processes that fell below the threshold of most security controls. The creators of the Conflicker understood how to exploit the Defense in Depth strategy realizing that by “flying under RADAR” of the network’s security controls it would be able to infiltrate within the inner