Cyber Security

Read Complete Research Material



Cyber Security

Abstract

With the emergence of the Internet and the extent of its use on a massive scale in the region during the last decade, new threats have emerged and new ways of crimes over the internet have presented themselves as a challenge and as a result it has become an increasingly important priority for the governments of the states because of the fact that many companies and individuals are now facing increased attacks on their computers increasingly persistent and tech. The threats are diverse, from hackers that are seeking to enter banking and financial accounts of the citizens of the sates. Along with that there are also terrorist groups or other enemy nations that are improperly seeking to enter government networks to steal all the sensitive data or sabotage critical systems such as the electrical grid, nuclear plants or the stock market to derail the overall economic condition of the state. The issue of privacy has sparked a heated debate, why many states are now launching some of its pilot programs to help defense contractors protect their networks, but Defense ensures that no classified information has been lost. This is the reason why the Homeland Security Department of states of the world is searching for a defense program as a model to prevent hackers and hostile nations affect critical infrastructure of their state.

Cyber Security

Introduction

Today, many aspects of our lives hugely rely on computers and internet, which includes different communication mechanisms which we use in our daily life to communicate with each other these includes: cell phones, e-mails, and texting, and government stores some essential records on computer records such as: birth and death records of the citizens, taxation records etc, and finance which includes all the essential information regarding the bank accounts of the individuals, and loans, and the electronic payments that we perform in our everyday life through atm. Along, with that there are many other things that are stored on computers and other devices that are connected to the internet. Now just consider the fact that how much of the personal information is stored on computers that we use in our daily life, and another important fact then that is the consideration of the fact that how these systems and the data stored over it could be kept secure. This calls in for cyber security as it involves the protection of all our essential data present in our system; it is cyber security that our system relies on no matter whether these are at our home, schools, or offices. They all need cyber security to protect them from cyber threats present over the internet (Amoroso, 2007). These attacks are often carried out by skilled criminal or subversive organizations, sometimes supported by states, they threaten sensitive information placed at the heart of information systems and the functioning of computerized processes that drive the functioning of society. Given the magnitude of this cyber threat, businesses and governments have an incentive to enroll in a systemic approach to cyber security, ...
Related Ads