Saturday, May 4, 2019

Cyber Security Information Technology Research Paper

Cyber Security Information engine room - Research Paper ExampleTheir motives are divergent, with some being political while others are erect for malicious purposes. This has prompted various g all(prenominal) overnment and security agencies to intervene in order to rescue the situation. This paper allow for analyze cyber security, those likely to be affect in network hacking and the role of the government in defend infrastructures vulner suitable to cyber attacks. Difference between data assurance and cyber security There is a distinct contrariety between information assurance and cyber security. On one hand, information assurance entails putting in bug out measures that protect information and information systems, which ensures their availability, reliability, non-repudiation and discretion (Westfall, 2011). The information may either be electronic or general information within an organization. While dealing with electronic information, the system must be able to address th e confidentiality concerns, by either introducing passwords or corporally protecting the hardware. Likewise, the information system must be in a position to monitor all the information and direct it to the legitimate users (The national technical Authority for Information Assurance, 2011). Broadly, information assurance aims at ensuring that information moves to the slump person at the right time and place. On the other hand, cyber security involves the effort of the organization or individuals to protect valuable information through preventing, detecting and even responding to prevailing threats. In cyber security, most of the attacks are online, since the process involves the use of the internet, although physical safety is necessary due to the protection of hardware involved in the transmission of information. Some of the threats involved are more serious, although this is subject to the ability of the organization to deal with them (McDowell & Householder, 2009). There are tw o giving categories of cyber attacks. One is when an attacker studies the security of the system and develops malicious programs to destroy the servers. The other attack is the zero-day attack, in which cuticle the attacker bombards the system even before implementing the security measures (Fujiwara, 2006). Potential hackers and their motives Hackers have varied reasons for hacking into a cyber network. It is classic to note that anyone can qualify to be a hacker, as long as there is an objective to access private information without permission. The leading cyber threat involves the financial sector, in which case the hackers engage in a number of ways. The first case is account takeover whereby criminals exploit financial and online systems, taking over the functions of the account holders. The aim of this crime is to pose as the legitimate owner, as this gives the criminals access to the accounts. Eventually, the criminals transfer all the property to their accounts or withdr aw the cash for their personal use. Another group of hackers consists of those criminals who engage in the three party payment processor breaches. In this case, hackers target colossal multinational companies, which have a large network of payment processors. By compromising the personal identifiable information of the employees of such companies, the hackers go in the lead to seek payment or other financial benefits from the employer. Their aim is to siphon as much cash as possible before the organization realizes it is not dealing with the real employees (Snow,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.