Professional Writers
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Fill the order form details - writing instructions guides, and get your paper done.
Posted: September 25th, 2022
Computer Sciences and Information Technology
Security Threats
Read Top Ten Security Risks for 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers (Links to an external site.) and research three security threats using credible sources (scholarly journals and articles). In a two- to three-page MS Word document, be sure to:
• Be sure to:
o Identify and describe the three security threats you selected.
o Describe how the threat manifests itself?
o What security mechanism would you use to mitigate each threat?
Security Threats
The nature of security threats in recent decades has shifted from being entirely physical to online threats. The increased use of the internet coupled with the high rates of its advancement has given birth to both positives and negatives. The recent study Cisco showed that cybersecurity is what organizations should watch out for which creates the need to increase protection and prevention measures.
Among the top 10 security risks identified were hacking, insider threats and the Internet of Things (Kingori, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). Hacking is the attempt to illegally get into a computer system or private networks without the knowledge or authorization of the owner. The main aim of the hackers is to break into the systems to alter or steal the information. There is a financial gain attached to hacking into the systems which act as the motivation behind the criminal activity by the hackers. For example, breaking into the banking systems and stealing credit card information or altering the banking systems can allow a hacker to transfer money without the knowledge of the bank.
Internet of Things (IoT) is among the newest technologies that enable communication between computing devices and systems (Jie et al., 2013). It is possible to transfer data across networks without the need for human-to-human interactions. Today, many homes in affluent communities make use of smart home technology which is only made possible by the IoT. The technology allows the communication between the electricity systems and the owner’s mobile device such that by the click of a button on the mobile phone, a homeowner can switch off the lights at home even when miles away. Insider threats refer to malicious attacks on the computer systems of an organization by people within it. It could be the current or former staff or associates with inside information about the systems and security practices of the organization.
Hacking involves an unknown person behind a computer who gets into the systems of the target and retrieved information that is then used to alter or to manipulate the target. The hacker may choose to blackmail the target and request for a ransom when they get hold of very sensitive information. An IP address could be all the hacker needs or an obvious password for them to get into the systems. IoT involved the storage of a lot of personal information into the systems. A hacker gets into the systems and retrieves data such as the current location of a homeowner and then plans on a home break when the owner is away. Insider threats are very common when a mole gives out organizational passwords of the rivals who then hack into the systems causing damage which will slow down the growth (Dalal, & Gorab, 2016: 2024 – Do my homework – Help write my assignment online). The rival company then gets an opportunity to grow and pass the target company which happens mostly with business empires.
Cybersecurity threats have a major common cure that works across all the existing threats. Training employees on the safe use of the internet and the computer systems should be the top priority measure which will work as a preventive action (Gunkel, 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). The other most important action that companies should take is adhering to the cybersecurity both the national and organizational cybersecurity standards. For example, using a two or three-step authentication process and not sharing passwords should be strictly used and sanctions put in place for any employee that breaks the rules. Lastly, it is important to invest in computer systems that can detect and warn of an incoming threat which with the help of the well-trained staff will save the company from the damage of the attack.
It does not matter whether a company or an individual has faced a cyber-threat before or not, the reality is at one point, they will be open to the dangers. It is necessary to put heavy preventive measures to avoid the damage that could be caused by a cyberattack.
References
Dalal, R. S., & Gorab, A. K. (2016: 2024 – Do my homework – Help write my assignment online). Insider Threat in Cyber Security: What the Organizational Psychology Literature on Counterproductive Work Behavior Can and Cannot (Yet) Tell Us. In Psychosocial Dynamics of Cyber Security (pp. 122-140). Routledge.
Gunkel, D. J. (2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online). Hacking cyberspace. Routledge.
Jie, Y., Pei, J. Y., Jun, L., Yun, G., & Wei, X. (2013, June). Smart home system based on IoT technologies. In 2013 International Conference on Computational and Information Sciences (pp. 1789-1791). IEEE.
Kingori, D. (2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers, January 17). Top 10 Cybersecurity Risks for 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers. Retrieved from https://www.uscybersecurity.net/risks-2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers/
You Want Quality and That’s What We Deliver
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.
Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.
When you decide to place an order with Nurscola, here is what happens: