Technology has changed a number of methods and means how things used to operate. Various fields that include medicine, science, education and other walks of life have been hugely affected and improved by technology. One of the most benefited areas by technology is Businesses of various natures. The companies have now shifted from the manual methodologies several networks especially internet. This major shift has now been adapted by numerous organizations. These Organizations have eased various business operations and functions thereby exploring the different applications of the internet. However, in spite of a number of advantages that the businesses have achieved through the use of internet, the internet has also exposed the businesses to a number of threats that the internet is vulnerable to.
Discussion
It is unfortunate, however, internet has been the major source or means of numerous ethical activities and crimes. These include cyber attacks, copyright violations, robberies and thefts through internet, information manipulation and corruption and much more.
Overview/ Analysis
The companies and organizations, in order to establish and maintain affective information and communication systems, have always used networks of different sizes and natures. However, since the year 2000, there has been observed a shift from the use of manual networks to the development and adaption of the Web based applications that also include social networking websites.
Whatever the case may be, the crimes that include unauthorized access to the networks, use of unauthorized services, retrieval of confidential information, introducing viruses in other foreign networks are the most commonly observed threats the networks in an organization are vulnerable to. As a result of these vulnerabilities, these business organizations are also exposed to crimes more alarming such as problems in e transactions, security threats to the official websites, penetration into the network for extracting private information such as companies data records and much more (Schmitt, 2011).
Status Report
Various surveys and studies conducted in the span of last three years states the number of cyber attacks have only been increasing. It has been pointed out that despite of the innovation of many technological tools to control such security breaches, the companies have only been more prone and vulnerable to various threats. The Internet Security Threat Report gives an analysis and overview of the global threat activity in the year 2011. The data for this repot was provided by the Global Intelligence Network. The report mentions ...