Tuesday, January 7, 2020

Cyber Security An Analysis - 2290 Words

CYBER SECURITY: AN ANALYSIS OF THE METHODS 2 Cyber Security An Analysis of the Methods to Prevent a Cyber Attacks by Public Organizations Submitted by Pierrechrist Ekue-Hettah GPA 8061, Hamline University Chris Owens, Instructor 24, April 2016 Abstract Since 2000, internet use has rapidly increased to more than 2.4 billion users worldwide, with 70% of those users using the World Wide Web every day (The Culturist, 2013).These days it simply takes minutes for news to travel around the globe. In the twenty first century, cyber security is an international topic. The threat of cyber warfare is existent and would be devastating beyond any weapon imaginable. With the entire world becoming more interconnected, a cyber-attack could: control information access, ground airplanes, hijack nuclear facilities, and perhaps most importantly, bring the global economy to a stop, creating mayhem from Wall Street to China, London, and Paris. What is different and challenging about cyber security is that it is not only relevant to just one nation like national defense or economic policy may be, but somewhat a global concern that requires a global response. This paper will investigate the significance and threat of cyber security locally and will give recommendations on how public organizations can prevent such attacks to sensitive data. This paper will address the important steps necessary for public organizations to develop and strengthen current cyber network security to 21stShow MoreRelatedAnalysis Of The Cyber Security Industry Essay1514 Words   |  7 PagesAnalysis of the Cyber Security Industry Cyber security is a fast-growing industry. With more and more persons using connected devices as part of their daily lives, there is an increasing need for security. Not only are individuals in need of cyber security solutions but also corporations and governments are acutely aware of the dangers of hacking. As a result of the need, the cyber security industry is expected to reach $170 billion by 2020 (Morgan 2015). To understand this industry, it is importantRead MoreCyber Security And Risk Analysis3342 Words   |  14 PagesAs a student pursuing a major in Security and Risk Analysis, also known as Cyber Security, it has been repeatedly drilled into my head how much potential the Internet has to change the ways in which people experience the external world in which we live, for better or for worse. The Internet, consisting of a gargantuan amount of data, is composed of more than 150 million websites, such as Facebook, LinkedIn, blogs, or other virtual worlds such as Second Life. Su ch websites, made possible by the InternetRead MoreCyber Security Case Analysis961 Words   |  4 Pagespeople and policy and the perspective attach vectors, an impact assessment was completed and counter measures identified. The counter measures also addressed the areas of current weaknesses and emerging weaknesses in hopes to maintain a strong cyber security posture. For current technology vulnerability the outdated antivirus was used an example that pertains to all corporations to include Yahoo!, where malware can be introduced into the companies system. The attack vector for this vulnerabilityRead MoreAnalysis Of Cloud Computing And Cyber Security1695 Words   |  7 Pages CLOUD COMPUTING AND NETWORK SECURITY ISSUES(Z5140305) Executive Summary In this fast-paced technology era, organizations are always looking for new innovative ways to increase productivity and efficiency. One emerging technology adopted by many organisations is cloud computing. Cloud computing is a model that uses internet and remote servers for maintaining data and applications (Association of Modern Technologies Professionals 2017). It replaces expensive infrastructure and need of maintenanceRead MoreBotnet Detection And Analysis Of Cyber Security1681 Words   |  7 PagesDETECTION AND ANALYSIS. Introduction A botnet, otherwise known as â€Å"zombie army,† is a group of computers that are compromised or controlled often from a single source a human operator known as a â€Å"Botmaster,† and run related software programs or scripts [1]. In contrast with the previous malware, botnets have the characteristic of a command and control (C C) channel, and use existing common protocols, such as IRC and HTTP [1]. Botnets provide a distributed platform for many cyber-crimes suchRead MoreCyber Security Vulnerability : A Analysis On The Vulnerabilities As Well As The Uses Of Cyber Intrusions2396 Words   |  10 Pages Cyber security vulnerability Bryan States University of Maryland University College Professor CSEC 610 July 7, 2015 Introduction An analysis on the vulnerabilities as well as the use of cyber intrusions in an organizational network has become key for running businesses (Sengupta, Mazumdar Bagchi, 2011). Enterprises including academic facilities, government parastatals and manufacturing firms are started to carry out business. The organizations mentioned above will in one way orRead MoreCyber Security Operations Centre ( Csoc ) Investigates And Analysis Cyber Attacks On Uk Networks1212 Words   |  5 PagesCyber Security Operations Centre (CSOC) investigates and analysis cyber-attacks on UK Networks and provide solutions and means to mitigate future attack. Its job is in cyber forensics and incident response while the Government Computer Emergency Response Team (GovCERT) deals with the public sector organisations on issues relating to computer security incidents, warnings, alerts, assistance and advice to prevent, reduce expose and mitigate attacks. The National Crime Agency formed in Oct 2013 toRead MoreCyber Surveillance And Cyber Security Monitoring1021 Words   |  5 Pagesâ€Å"Cyber analytics is a branch of analytics that systematically provides the analysis of the data pertaining to the domain of computers and network. It basically, tells the story behind cyber data. Cyber analytics is used to support computer security, computer or network administration, auditing, and several other application areas.† Implementation Cyber Security Monitoring To perform adaptive cyber-security analytics using a computer implemented method that includes receiving a report on a networkRead MoreImpact Of Legislation On State Of Maryland1210 Words   |  5 Pagesthis paper is to research and evaluate the legislative drivers for information security programs of State of Maryland in order to improve the information security policy to prevent loss of the confidentiality, integrity and availability of agency operations, organizational assets or individuals with new amendments in legislation. This paper elaborates the objectives of five proposals that would impact the information security policy of the State of Maryland upon becoming legislation. State of MarylandRead MoreCyber Security Role For Homeland Security Intelligence1153 Words   |  5 Pagesshown major flaws within the intelligence community. Those events led the creation of the Department of Homeland Security and with it pooled federal agencies into in umbrella for it to be centralized in order to be effective. There are three categories in which the Homeland Security Intelligence face in the 21st century. Those categories are technological, political, and cyber security. In this day in age everything from critical infrastructure, government information to money is being digitalized

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.