U. S. Navy Targeted

Read Complete Research Material

U. S. NAVY TARGETED

U. S. Navy Targeted

Contents

Introduction3

Cyber security and Hacking3

Hacking4

Cyber security issues4

Discussion5

U.S. Navy Cyber security5

Coca-Cola Cyber Threats7

Mission7

Privacy Policy8

Cyber Security threats to the organization9

Potential Threat Identification10

Organizational Defense against the Threat11

Conclusion12

References14

U. S. Navy Targeted

Introduction

Cybercrime is criminal activity, using computers and the Internet to steal, whether directly or indirectly, from consumers or businesses. The global scale of the cybercrime problem is not known, although by most estimates it is running at several billion dollars (USD) per year. This paper aims to examine hacker culture and related psychological and cultural aspects of cyber security from the perspective of both the malicious actor and user. Privacy policies have been enforced in action by many organizations of the world, which aim to ensure the security of the information available on websites regarding their customers. The case of the United States Navy will be analyzed regarding past incident in cybercrime or cyberwarfare. The specifics of this past incident will be discussed. The paper will be analyzing motivating factors for threat actors/attackers. This may include the motivation of the defenders, and any possible third-parties. The management and methods for the organization will be suggested discouraging hackers or intruders with similar motives. This paper will further involve policies or technology controls to reduce cybercrime and similar attacks.

Cyber security and Hacking

In the present time, cyber security is considered as one of the most significant issues which are speculated to grow further in the near future. The future of cyber security is indeterminable and ambiguous. Most of the organizations and government agencies globally are being affected by the cyber security. During the occurrence of cybercrime, most organizations and agencies seem to be meet information security issues, which include hacking or similar data breaches. Therefore, the urgent need to develop and maintain methods of dealing security issues arises. The increasing use of internet and mobile phones further, raises the issue of developing and maintaining the methods, to bring safety and security to the information and related communication technologies (Palmer, 2011).

Hacking

Hacking may be defined as the unauthorized interference in or access into a computer system, or any access with the intent of corrupting, altering, stalling, or destroying, by making use of a computer or other comparable devices of communication and information, with no knowledge or consent of the possessor of the information and communications system or the computer, counting in the loss of electronic document or electronic data messages, theft, alteration, destruction, and corruption. This is executed by the crackers or hackers. Initially a hacker used to be a positive term used for somebody who has a thorough knowledge regarding the computer and has a fine grip over the computer skills, and who may impart services for the betterment of the internet. Then the negative adverse activities of hackers started utilizing the term cracker for the order of identifying the ones having even lesser than honorable intents (Marcos, 2010).

Cyber security issues

In order to attain a vibrant information society, we have to deal with the cyber security issues, for giving the dependency on the ...