Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
Currently, the internet has become a significant infrastructure, which has brought new degrees of productivity, convenience, and effectiveness for the private and public firms. The many incidents of internet attacks reflect the vulnerability of the information systems, the severity of malicious programs and the offensive nature of technology. Similarly, either attackers can hide their identity, through disabling logging facilities or altering event logs, which makes them go undetected. On the other hand, some programs have the capability of disabling anti-virus or penetrate firewalls. This has made such security violations to have multi-dimensional impacts on individual internet users, businesses, time, human resources, loss of money, and psychological losses. This, on another hand, shows that the internet and the superior information infrastructure are not short of security violations (Wilson & Kiy, 2014).
Many scholars have given possible reasons the internet is vulnerable to these attacks. The reasons include failure to enforce policies, ignorance of new vulnerabilities and high expectations from technical skills. In addition, the scholars have suggested that these risks result to insecurity challenges for the information society. Although governments have made efforts to enhance security on their own computer, networks to prevent attackers from gaining access to computer systems (Li, 2006). In fact, most of the governments across the world have shown their concerns to the private sector, mainly due to them becoming targets of these attacks. Overall, cyber attacks have consequential influential impacts, mainly economic effects, because companies end up becoming targets of blackmail and loss of both financial information and money.
Cyber security is a proportional concept. On one hand, it includes a comparison between security and attack methods. On the other hand, it entails a comparison between varying security methods. In the computer world, it is common knowledge that the attack methods develop faster when compared to the security techniques, regardless of the motives. In other terms, the hardware components, software, including other information system constituents are always at risk, which makes them exploitable. In respect to the comparison between the different security methods, the existence of different settings, use of different hardware, and software, and the use of different security methods, they all result to the difference in the levels of security. Therefore, this makes it clear that every organization will have a different security level (Li, 2006).
Owing to the different views on cyber security, including the approaches used to ensure that systems are safe; there are four renowned concepts of cyber security. They include a five-layer model of computing systems, a payload vs. protection paradigm, the nine Ds of cyber security and differentiation of the security threats into distinct categories. The significance of the concepts was illustrated by examining a disturbing cyber security threat, which was easy to study and almost predictable in respect to the concepts, but of which were previously unknown. In order to attain effective protection, it is important to develop a strategy, which should be central to the analysis of relevant and potential threats (Li, 2006).
Alternatively, it is essential to model the existing computing systems as comprised of various levels to make evaluation possible. Some of the renowned examples are the TCP/IP model, which has various differentiations in four, five, and seven layers, including the four-layer privilege ring model. The five-layer model comprises straightforward categories of observable attack vectors. Computing systems are perceived as a combination of two parts: (1) the functionality, which result to an asset value (payload), and (2) the measures, which the asset owner puts in place to manage the use (protection). Lastly, the nine Ds, which are the most utilized frameworks, can help in achieving a balance, mainly because they provide an easily remembered approach, which are central to the DoD's three tenets of cyber security (Wilson & Kiy, 2014).
Significant Threat to Data
Phishing refers to ways used by cyber criminals to target organizations in order to access the company's private information. This approach uses emails, which most of the time contain malicious codes. Once one opens the email, then all our systems can become undermined. In this regard, cyber criminals have tried using this method, but most of the times we have emerged successful. Our company has installed enterprise-level email security software, which checks both incoming and outgoing email messages (PATC, 2010).
Poor Configuration Management
Although we are professionals in the area of cyber security, we have witnessed cases where some staff fails to follow the organization's configuration management policy. Owing to the vast use of networking, our company requires strong security, which restricts the computers that can connect to the company's network to make it safe from this attack. In addition, the firm has implemented a Network Access Control Solution, which helps in enforcing configuration policy needs (PATC, 2010).
Although this has not happened in the organization, it is a possible approach. This is due to the many workers who use smart phones, and their security is easily breached. Actually, this has complicated the approaches to security, considering that it is possible for the mobile phones to get lost, or cyber criminals can compromise those using malicious codes. Therefore, the firm has offered to encrypt the employee's mobile phones, and alternatively, the company is opting on implementing a strict policy, which will confine the utilization of smart phones in the work environments (PATC, 2010).
We also appreciate the fact that it is possible to have employees who cyber criminals can compromise to provide authentication information, and other relevant information, which can make the organization vulnerable to attacks. Therefore, we have provided several employees with different accounts, or rather different levels of access to the firm's systems. In addition, all the computers have disabled "auto-run" and sensory alarms in an event an employee plugs in or out a removable media (PATC, 2010).
As noted, cyber criminals target several types of enterprises, particularly when the firm or organization is dealing with information systems, and the internet. In this context, our company deals with information technology, and offers protection to cyber attacks. Therefore, our company qualifies as a high profile company, which can be a possible target from the cyber criminals. In addition, it is essential to know that we provide IT personnel for several government and private contracts. In fact, we encounter classified government information at various levels, in our course of work (Moore, 2005).
The documents we hold for the private sector, especially those with financial information, makes us possible targets from cyber criminals. Then again, our corporation has a valuable IP. Our security provision activities that have seen to success in the protection of data, networks and computer systems, have made some of the cyber criminals angry. For example, it is only a month ago when we received an infected mail, but due to our expertise, we were able to establish that the mail would cause harm to our systems (Moore, 2005).
Therefore, this is only proof that we are, and we will continue being targets as long as our business continues. Last year, we managed to secure the government's infrastructure from possible breach and later on, we received a warning message. The most significant achievement from our side is the security we provided to the electoral system from possible bugs, which were meant to manipulate the results. Therefore, our sophisticated activities make cyber criminals to get us out of business because we have served as obstruction to their anticipated "success."
Risk management is a discipline by itself and can occur in any type of organization. In this context, it is a process used by organizations to spot, examine, assess, and treat loss exposures, monitor risk manage and financial reserves to moderate the bad influences of loss. In fact, the concept of risk management was only used in business, or organizations dealing with production and such; however, with the advancement in technology the concept has been utilized and integrated in cyber security. It is because cyber attacks are possible threats to the success of an organization, mainly because it compromises the security of the organization (Kenneth & Jane, 2000).
Research has shown that security breaches have reached alarming rates, which have amounted to loss of money in billions. Therefore, this calls for risk management to ensure that it is possible to identify areas of vulnerabilities in a system and ensure it is safe. Organizations are now engaging in risk management to identify vulnerable assets, which has resulted to protection of crucial data. It is, however, impossible to prevent cyber attacks, but it is possible to know the emerging attacks, which help organizations to stay updates in case of such an attack (Kenneth & Jane, 2000).
Most of the organizations fail to purchase original recommended security software and end up relying on the software that security provide with the operating system. It is, however, essential to have security software, which will ensure that it can detect malicious programs, including the websites containing malicious codes. Alternatively, organizations should practice the…[continue]
"Laws On Cyber Crimes" (2014, May 10) Retrieved December 8, 2016, from http://www.paperdue.com/essay/laws-on-cyber-crimes-189056
"Laws On Cyber Crimes" 10 May 2014. Web.8 December. 2016. <http://www.paperdue.com/essay/laws-on-cyber-crimes-189056>
"Laws On Cyber Crimes", 10 May 2014, Accessed.8 December. 2016, http://www.paperdue.com/essay/laws-on-cyber-crimes-189056
Cyber Crimes and the FBI The investigative techniques used by the FBI in the case of Vasiliy Gorshkov and Alexey Ivanov were completely legitimate and necessary; moreover, they demonstrated that law enforcement of the United States was prepared to use any means necessary to apprehend these flagrant security risks. "Court papers described the men as kingpins of Russian computer crime who hacked into the networks of at least 40 U.S. companies
Cyber crime is an ongoing and growing problem for businesses, for government, and for private individuals throughout the world. This paper identifies the kinds of cyber crime that are threatening computer users, notably businesses. It also proposes strategies that businesses can embrace that will (in many cases) prevent the intrusion of cyber criminals into servers and hard drives. What particular cyber crimes do businesses / individuals need to be wary of? An
Cyber crime exerts threats to individuals, organizations & countries across the world. From the above provided descriptions it is comprehended that the computer crime is a serious crime that necessitates immediate attention of the law and of the law enforcement agencies. 0. There prevails no solution except to take strict measures to deal with cyber crimes against the speedy expansion of the communications & information technology and telecommunications networks. References Areheart,
Cybercrime, Cybercriminals, And Cybercops Cybercrime Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such
Crime Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only
data collection includes survey form, structured interviews using closed ended questions, and gathering information regarding a sample size appropriate to analyze and draw conclusion on the basis of the research results. The statistical techniques are used for data analysis to analyze collected data in quantitative research methods. The qualitative data is gathered through case study method and open ended question of an unstructured interview from notable sample. The qualitative
Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch