This website uses cookies to ensure you have the best experience. Learn more

Overview Of Cyber Security Essay

1482 words - 6 pages

Online security breaching is criminal activity that can happen from any part of the world through the hacking of any infrastructure. Most breaches are done through the falsifying and personal information or even a breach of security stemming from lack of security. Now that more and more crime is happening over the internet there many different aspects to security as a whole. Due to the drastic increase in modern cybercrime the police, information technology specialists, detectives, and even the government need to work together to find a solution. Law enforcement can provide security measures to prevent security issues, “law officials take significant actions against preventing major security breaches” (Kak & Parakh, 2009 p.426). In the world of online security there are many divisions that must be tracked as well as prevented. Those divisions consist of an entire economic society that affects the criminal, victim, and overall worldwide economy. While some may debate that giving the government the ability to track the public’s internet usage is an invasion of privacy, limits one’s freedom of speech, and unnecessary it is crucial to develop a method to protect the public from those who seeks to attack a higher security structure.
Security breaches come within a place where an individual has higher security clearance than others. It is extremely unfortunate that trust can be a problem having the wrong individual at the helm of important material. This type of person can be very difficult to prevent due to the employees easy user access of the computers and access to private information. Most importantly businesses must be aware these crimes occurring and always be mindful with giving employees the access to important personal information. Federal agencies, businesses, and general public are potential victims of any type of breach of unauthorized personal information. Access can be granted through by the wrong individual lurking through files or computers that are housing personal information. Although individuals can breach unauthorized information “Government officials look to provide training for IT professionals to prevent unauthorized access” (Etzioni, 2011 p.58). Victim can respond to individuals sending falsifying emails attempting to access to bank accounts and other personal information. Some information can be obtained by employing the wrong individual and giving them access to information with such importance. Sometimes these requests may not come in email form but rather a website that looks identical to a legitimate site. Many of these websites are extremely convincing and difficult to distinguish between the real ones. Educating people on the presence of online security and techniques to avoid fraud is crucial to prevent the success of these criminals.
Viruses are another type of security breach that is destructive to personal information. Viruses can come from emails, popups, unsecure sites, or hackers simply...

Find Another Essay On Overview of Cyber Security

Overview On The Department Of Homeland Security

628 words - 3 pages Homeland Security leverages resources within Federal, state, and local governments, coordinating the transition of multiple agencies and programs into a single, integrated agency focused on protecting the American people and their homeland. More than 87,000 different governmental jurisdictions at the federal, state, and local level have homeland security responsibilities.Those agencies making up the Department of Homeland Security are housed in

Cyber Security Controls As a Public Good

2486 words - 10 pages Overview Society today is plagued with crime that is difficult to combat, constantly changing, and has no borders; this type of crime is called cyber-crime. The United States of America is attacked on a daily basis by cyber criminals both foreign and domestic. The crimes committed involve fraud, identity theft, theft of proprietary trade secrets, and even theft of national secrets. The 2009 Internet Crime Report indicates there were 336,655

Cyber Security

1953 words - 8 pages Energy Industry - Cyber-Attacks And Regulations For many industries relying solely on NIST framework is not enough. The framework is not meant to replace their existing processes of handling cyber threats, however, by using the framework as a base, they can find the gaps in the most important infrastructure and figure out a way to harden and improve its security. For example, the energy industry is one of the most important industries and it has

Cyber Warfare: Defending Against a New Form of Terrorism

972 words - 4 pages Introduction Cyber warfare is a new type of terrorism is the United States. The United States National Security Team is responsible for handling computer warfare battles against hackers. The government should invest more money and resources in cyber warfare defense to protect our nation’s economy and infrastructure that is heavily dependent on technology. Imminent Threat The threat of a cyber-attack on our nation’s infrastructure is now viewed

Living in the Information Age

597 words - 3 pages the majority. America’s Effort in Thwarting Cyber-attacks Homeland Security (2014) reveals that the Secret Service has an Electronic Crimes Task Force, which focuses on locating and identifying Cyber criminals. This commission contributed to the arrest of international cyber criminals who are responsible for the loss of $600 million. The Secret service also controls the National Computer Forensic institute. This organization has an obligation

Cyber Security

1295 words - 5 pages . Cyber terrorism is one of the major treat to all sensitive information in cyberspace. Cyber terrorism can be defined as the use of computers and technology to cause server disruption or widespread fear in society. Through cyber terrorism data that is sensitive to major corporation and government alike are in danger of being hacked then used against them. Cyber security helps defend against cyber-attacks by tracking the attackers back to the source

Cyber Mission Assurance – Defining a Framework

1171 words - 5 pages to continue to enjoy the benefits of the information age, preserve our security, and safeguard our economic well-being, we must protect critical computer-controlled systems from attack (White House, 2000, p. ii) According to Cherry (2010), information loss negatively affects the ability to provide cyber security. Bargar (2008) stated a reliable and resilient global information infrastructure is critical for national security. “Real-time risk

Different Methods of CyberCrime and Their Effects on Modern Society

1363 words - 5 pages Adapt. Retrieved December 2, 2013, from: U.S. Department of Homeland Security. (2013). Combat cyber crime. Retrieved December 2, 2013, from: U.S. Department of Homeland Security. (2013). Cybersecurity overview. Retrieved December 2, 2013, from:

The Need for a Well Organized Response to Cyber Attack

909 words - 4 pages serious cases, military and intelligence. The sharing of information between such entities is increasingly seen as important. Concerns about cyber-security are widely held. In its 2012 survey of senior decisionmakers in the public and private sector the World Economic Forum (WEF), found that cyber-security was ranked especially high by respondents as a technological risk being of global importance.1 In 2011, Norton, part of the Symantec multinational

The Republic of India

936 words - 4 pages India’s weakness to the menace of cyber-attacks will become greater. Critical infrastructures and sensitive computer systems in India have been become targets for crackers. They’ve been successful at compromising them and in many cases their compromise hasn’t also not identified for a considerable period of time. Several obvious cyber security problems exist in India to the extent that they require urgent attention on a priority basis. Example: A

Computer Crime

1796 words - 8 pages hackers are usually employed by companies to hack rival companies websites to gain valuable information to help get one step ahead of them. They are also sometimes hired to hack the websites of their employer, and the employer will use this to measure how good or bad the companies security system is (Dashora 245). The final type of cyber-criminal is discontented employees. This group includes people who have either been fired by their employer or are

Similar Essays

Importance Of Cyber Security Essay

2012 words - 8 pages noted, “The government is bringing about unprecedented transparency and liability for Americans to take part in their democracy.” (Obama, 2009). Administration Key Cybersecurity Policy Principals Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are a national asset and our defense

An Overview Of American Security After September 11

1791 words - 7 pages the increasing disposition of the U.S. to threaten or use force over the past twenty years in National Cyber Security. Although, U.S is part of an international agreement, key differences remain that NATO ‘owns’ its own cyber defense infrastructure, which means the responsibilities of each nation’s cyber security remains within the national government. Most recently, Obama declared, “cyber threat is one of the most serious economic and national

Rule Of Law In Cyberspace As A Means And Way To Cyber Security

1066 words - 5 pages During the last some decades we can find out a significant increasing of crimes committed through the Internet. The most dramatic thing is that such kind of crimes normally cover some countries and therefore international, unified way of prevention and investigation of cyber crimes is needed. There are numerous theories and ways to prevent cyber crimes, to ensure cyber security, but I would focus on some basic directions. There are two basic

Overview Of Network Security Essay

1050 words - 4 pages Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to