Free Essay

How to Protect Your Network from Cybersecurity

In:

Submitted By Silverland0506
Words 2314
Pages 10
How to Protect Your Network From Cyber Attacks
There are three measures network administrators can take to avoid the types of network attacks that plagued U.S. and South Korean websites including www.whitehouse.gov, NASDAQ, NYSE, Yahoo!'s financial page and the Washington Post. The three areas to focus on are network based mitigation, host based mitigation and proactive measures.
Network based mitigation * Install IDS/IPS with the ability to track floods (such as SYN, ICMP, etc.) * Install a firewall that has the ability to drop packets rather than have them reach the internal server. The nature of a web server is such that you will allow HTTP to the server from the Internet. You will need to monitor your server to know where to block traffic. * Have contact numbers for your ISP's emergency management team (or response team, or the team that is able to respond to such an event). You will need to contact them in order to prevent the attack from reaching your network's perimeter in the first place.
Host based mitigation * Ensure that HTTP open sessions time out at a reasonable time. When under attack, you will want to reduce this number. * Ensure that TCP also time out at a reasonable time. * Install a host-based firewall to prevent HTTP threads from spawning for attack packets
Proactive measures
For those with the know-how, it would be possible to "fight back" with programs that can neutralize the threat. This method is used mostly by networks that are under constant attack such as government sites.
Business Insider
12 Quick Internet Safety Tips That Will Save Your Digital Life From Getting Hacked

* Lisa Eadicicco * * May 28, 2014, 9:50 PM

If we've learned anything about cyber security in 2014, it's that hackers are becoming more of a threat than ever before.
Within the past two months companies such as Microsoft, AOL, and eBay have been the victim of security breaches.
And let's not forget about the Heartbleed bug — a giant vulnerability that was discovered within an encryption protocol that guards a massive chunk of the internet.
If you've been laid back about your online habits, now might be a great time to change your ways.
Here are some tips to help prevent your digital life from being stolen, whether it be a password breach or an internet-wide vulnerability.
Make sure you've got a superstrong, unique password. In other words, ensure that your password is difficult to guess. One way to come up with a creative password is to brainstorm a random sentence. Take the first letter of each word in that sentence and use that acronym as the base for your password.
Don't use the same password for multiple services. Using the same term for all of your passwords leaves your entire digital life vulnerable to attack. This means that if a hacker has one password, he or she has all of your passwords.
Enable two-factor authentication. Many services, including Google, offer two-factor authentication for logging into your account. Instead of simply entering a username and password to log in, the website will prompt you to enter a code sent to your smartphone to verify your identity.
Apply software updates when necessary. Apple, Google, and Microsoft typically include security bug fixes and patches in their most recent software updates. So don't ignore those annoying prompts and keep your software up-to-date.
Carefully read the permissions before installing apps. This is one of the most prominent ways in which malicious apps can gain access to your personal information. These types of issues have been especially present in the Google Play store. A lot of apps ask for a lengthy list of permissions, and that doesn't mean they're all ill-intentioned. But it's important to be aware of the types of information your apps are accessing, which can include your contacts, location, and even your phone's camera.
Check the app publisher before installing. There have been numerous instances in which scammers have published apps in the Google Play store posing as another popular app. For example, in late 2012 an illegitimate developer posted an imposter app in Google Play pretending to be "Temple Run." A quick look at the publisher shows that the app comes from a developer named "apkdeveloper," not the game's true publisher Imangi Studios.
Avoid inserting hard drives and thumbdrives you don't trust into your computer. If you find a random USB stick, don't let your curiosity tempt you to plug it in. Someone could have loaded malware onto it hoping that an interested person was careless enough to insert it into their device. If you don't trust the source, you're better off not putting your computer at risk.
Make sure a website is secure before you enter personal information. Look for the little padlock symbol in front of the web address in the URL bar. Also, make sure the web address starts with the prefix https://. If these things aren't there, then the network isn't secure and you shouldn't enter any data you wouldn't want made public.
Don't send personal data via email. Sending critical information such as credit card numbers or bank account numbers puts it at risk of being intercepted by hackers or cyber attacks.
Keep an eye out for phishing scams. A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer. These web entities are designed to look like a normal email or website, which is how hackers convince their victims to hand over personal information. Phishing scams are typically easy to spot, but you should know what to look out for. Many of these emails contain spell errors and are written in poor grammar. Here's a great example of a standard phishing email from Microsoft's security blog:
Microsoft
Avoid logging into your important accounts on public computers. Sometimes you've got no choice but to use a computer at the coffee shop, library, or local FedEx. But try not to do it frequently, and make sure you completely wipe the browser's history when you're finished.
Back up your personal files to avoid losing them. You should keep a copy of all important files in the cloud and on some sort of hard drive. If one of them gets hacked or damaged, you'll still have a backup copy. http://www.businessinsider.com/how-to-prevent-cyber-attacks-2014-5 Read more: http://www.businessinsider.com/how-to-prevent-cyber-attacks-2014-5#ixzz3MjPtIFLs

* Rhoda Woo & Mike Monday * October 31, 2011 * Featured Article, Governance
How to Make Executive Boards Unattractive to Cyber Threats
Once symbolizing a guiding light to safety, beacons have taken on a more insidious meaning in cyberspace. To cyber criminals, they signal the ease with which sensitive corporate data that is potentially related to CEO succession planning, mergers or other board activities may be compromised or stolen. It’s a growing problem with serious consequences largely due to: * Increasingly sophisticated techniques to target individual executives * Dual-business and personal use of mobile devices * Unsecured dissemination of information through portals via open networks * The trend of greater transparency in board interactions and communications
Without proper safeguards, executive boards are attractive targets for cyber criminals looking to exploit digital vulnerabilities to gain access to sensitive corporate data and intellectual property. To defend against this, boards must examine how their own usage practices may be contributing to greater organizational risk.
Here are three critical areas of exposure to consider:
1. Phishing
Phishing is the criminally fraudulent process of attempting to acquire sensitive information—such as usernames, passwords or other personal credentials—by masquerading as a trustworthy entity in an electronic communication. Hackers typically go “phishing” by email or instant messaging, instructing users to enter details at a fake website that looks like the legitimate one. This form of cyber threat is on the rise as hackers increasingly target mobile devices and use social networking data to legitimize phishing requests.
At issue: Once primarily directed towards consumers, phishing now increasingly targets corporate board members, raising the stakes. Known as “whaling,” this technique is used by cyber criminals to steal board members’ personal identities and system credentials to gain access to enterprise systems, sensitive corporate information and intellectual property.
Many organizations have yet to position themselves effectively to ward off evolving threats posed by phishing and its selective targeting methods. But if attacks are successful, they can cause damage to both brands and board member reputations.
2. Mobile Devices
Valued as convenient productivity tools, mobile devices are here to stay. As board members serve on multiple boards and subcommittees worldwide, they are rapidly adopting and extending their use of smartphones, tablets and laptops. And they are demanding greater choice, flexibility and capabilities. Frequently leveraging these devices for personal and business use, they are often commingling personal and business data in the process.
At issue: Among the most obvious risks is the loss or theft of devices and the sensitive board information and other confidential materials that may have been stored on them. Mobile devices also are highly susceptible to malware threats.
For example, common attacks can involve enabling remote control of a smartphone via malware that interacts with the smartphone’s short message service (SMS) to steal contacts, messages and International Mobile Equipment Identification (IMEI) and International Mobile Subscriber Identification (IMSI) numbers. Attackers use IMEI and IMSI numbers to uniquely identify the victim device so they can send messages that appear to originate from that user’s device.
Without policies to address security gaps caused by Bring Your Own Device (BYOD) practices, organizations leave the door wide open to cyber intruders intent on data theft.
3. Hacktivism
A new breed of hackers, “hacktivists” engage in cyber schemes to further their own political or social agendas, including shareholder activism. They do so by taking advantage of public intelligence found on the Internet to target people of interest. Board members can be in the crosshairs based on information to which they have access, and common knowledge that most of that information may be stored on devices outside of enterprise control.
At issue: Hacktivists collect public intelligence on targeted board members to initiate social engineering, or seemingly legitimate contact, with a goal of fraudulently gaining access to sensitive information, including personal system credentials. Through social engineering hacktivists are often able to gain access to enterprise systems leading to deeper levels of sensitive corporate information. Hacktivists may also have access to details that expose technical security vulnerabilities that may be exploited to carry out future cyber attacks.
How to prevent cyber attacks
Through phishing, hacktivism and other sophisticated techniques, cyber criminals are targeting high-profile board members by capturing sensitive digital information and using it for their own purposes. The widespread use of mobile devices in the workplace—and a lack of appropriate security measures— has made this easier. Organizations can take steps to combat these threats:
Promote Ongoing Security Awareness
The failure of users to understand and follow enterprise security policies is a major reason for data loss. To that end, actions should be taken to refresh board members on the basics such as mobile device standards, current phishing schemes and how to encrypt documents. Also essential is an ongoing communication and awareness plan to consistently reinforce policies and advise the board of any updates or changes.
Prevent Phishing and Hacktivism
Mitigating these threats takes a proactive and collaborative approach, including the adoption of a cyber-intelligent security strategy focused on the collection and careful analysis of timely, relevant and actionable threat data. By better understanding what may constitute risk—and predictive modeling that gauges the likelihood of an attack— organizations can take preventative measures to thwart possible intrusions.
Protect Mobile Devices from Intrusion
When a mobile device is lost or stolen, enterprises can employ remote “wiping” techniques that delete all data from the device in question. Management of this function may require corporate management of all mobile devices used for business, as well as modification to any existing BYOD policy. In addition, encryption capabilities strengthen security and should be activated on all mobile devices. Ultimately, a thorough assessment should be performed to prevent infection from existing and emerging malware attacks.
Cyber attackers are hard at work, devising new methods of intrusion to disrupt business and embarrass corporate boards through targeted data theft. Because of the potential fallout, enterprises must operate from a state of readiness—and take appropriate, intelligent action—to combat the threats they pose.
This article contains general information only and Deloitte is not, by means of this article, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This article is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this article.
This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor.
Deloitte shall not be responsible for any loss sustained by any person who relies on this publication.
Copyright © 2011 Deloitte Development LLC & Corporate Compliance Insights. All rights reserved. 1. How To Prevent Cyber Attacks - Corporate Compliance Insights ... www.corporatecomplianceinsights.com/is-your-cyber-beacon...

Similar Documents

Free Essay

Csec 620 Individual Assignment 1

...Compliance 8 7. Responsibility 9 8. The Real World 10 9. Conclusion 11 References 12 1. Introduction Cybersecurity and cybersecurity initiatives are commonplace in all aspects of our digital lives. Personal computers are still widely used, especially in the workplace, but mobile devices seem to be the preferred computing choice of the average person. This would include but not be limited to; smart phones, tablets, and laptops to name a few. Mobile devices have changed the digital landscape in a manner that could not have been predicted. This is because other than work or school related activities, most personal computers were used to play a few games, check email, and browse the internet. These activities eventually transitioned over to the aforementioned mobile devices. Now we mix in social media, and a whole new digital cyber-world has emerged. Talk about getting your head out of the clouds. We live in the cloud, literally and figuratively. What does this mean to the average consumer? Perhaps not much. Most people who operate in the digital world could probably care less about the underpinnings of cyberspace and the digital devices that we use from the time we wake up in the morning until we go to sleep at night. As with many other aspects of our lives here in the U.S., there needs to be something in place to try and protect our citizens from the pitfalls that await them through the use of these devices. There is a reason for government intervention in...

Words: 2894 - Pages: 12

Premium Essay

Computers

...Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.  http://searchcompliance.techtarget.com/definition/cloud-computing-security https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf Threats from cloud computing IaaS providers offer their customers the illusion of unlimited compute, network, and storage capacity — often coupled with a ‘frictionless’ registration process where anyone with a valid credit card can register and immediately begin using cloud services. Some providers even offer free limited trial periods. By abusing the relative anonymity behind these registration and usage models, spammers, malicious code authors, and other criminals have been able to conduct their activities with relative impunity. PaaS providers have traditionally suffered most from this kind of attacks; however, recent evidence shows that hackers have begun to target IaaS vendors as well. Future areas of concern include password and key cracking, DDOS, launching dynamic attack points, hosting malicious data, botnet command and control, building rainbow tables, and CAPTCHA solving farms. Threat #3: Malicious Insiders Description The threat of a malicious insider is well-known to most organizations. This threat is amplified for consumers of cloud services by the convergence of IT...

Words: 1105 - Pages: 5

Premium Essay

En1320 Lab 2.1 Drafting an Essay

...EN1320 Duane Seneschal Ever feel like you are in a dead end job, your life is at the bottom of a pit? That is how I felt before I decided to go back to school. I realized that without a college education that my life was going nowhere. I had no future. I had to break out of this pit that had become my life and chosen job. Without a college degree I was going nowhere had no future. Deciding to get a degree is all good and well, but what degree what path? How does one go about making a decision of this magnitude? It is an overwhelming task that can be frightening. It’s like looking up from the bottom of a hundred foot deep pit and trying to figure out how to get out of the pit and back into the sunlight, it’s scary. Well I know that I enjoyed working with and building computers, and I enjoyed the security field. I started searching to see if combining these 2 fields was feasible or possible. To my delight and pleasure there was a degree program that did cover both of these fields together it was called Cybersecurity. After reading up on Cybersecurity I felt it was a field that I would enjoy. But what exactly is Cybersecurity? After much research what I discovered is that Cybersecurity is different technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. One of the most problematic elements of Cybersecurity is how quickly and constantly security risks to our data and systems that...

Words: 689 - Pages: 3

Premium Essay

Nt1330 Unit 3 Assignment 2

...what you should consider when writing a cybersecurity policy for a megachurch. Describe your business and your goals. Give your business a creative name. As a church, the primary goal is to offer a faith-based solution to issues while emphasizing the importance of collaboration. Various ministries exist within the organization and a focal point is to increase their scope and impact as time progresses. The outreach of a church stems far and wide, from kid’s service, bible study, and Men’s and Women’s Conferences, to Spiritual Resort Trips, and Teen Lock-In’s. Our goal is to allow youth, adults, and the elderly to lean on each other, and more importantly, lean on God. The main day of operation...

Words: 3281 - Pages: 14

Premium Essay

Cybersecurity

...sophistication and volume, and continue to trend upwards. WHAT IS CYBERSECURITY? Twenty years ago businesses did not think twice about cyber security. In a world of mainframes and dumb terminals with no connectivity to anything outside, viruses, malware, and hacking was unheard of, however, with the introduction of the Internet things have now changed. The term cyber security is getting more and more mixed usage lately, so much so that it is almost as ambiguous as the term "cloud". Cyber security, referred to as information technology security, is the focus on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Cyber security also encompasses ten different security domains. The following domains provide a foundation for security practices and principles: • Access Control - to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are determined by an organization's risks, threats, and vulnerabilities. • Telecommunications and Network Security - Telecommunication and Network Security is one of the most technical of the domains, because it addresses the various structures for a network, methods of communication, formats for transporting data, and measures taken to secure the network and transmission • Information Security...

Words: 1611 - Pages: 7

Premium Essay

Cyber Security

...growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat” means any action that may result in...

Words: 2041 - Pages: 9

Premium Essay

Csec 610

...most important vulnerability that IT managers face today. It will provide significant evidence about reasons why it is the most vulnerable, its impacts on a organization, and how an organization can best address its potential impacts. “As human beings, we are vulnerable to confusing the unprecedented with the improbable. In our everyday experience, if something has never happened before, we are generally safe in assuming it is not going to happen in the future, but the exceptions can kill you and climate change is one of those exceptions”. -Al Gore What is Vulnerability? When you think of the word vulnerability what comes to mind? Although, definitions of Vulnerability may vary, Vacca (2013) defines the term as “an asset or a group of assets that can be exploited by one or more threats”. In the cyberworld vulnerability can be described as a weakness in a computer hardware or software, which could possibly become exploited. Most would consider vulnerability, as a threat as the approach in which vulnerability can be exploited through a potential cause of an incident. Today, processes and technology alone can’t assure a secure organizational atmosphere. To compromise a satisfactorily secure organization, cybersecurity policies and procedures are inaugurated and expertise within an organization could conceivably be acerbic the edge. Vulnerabilities in the cyberworld are growing constantly as...

Words: 2316 - Pages: 10

Premium Essay

C156 Advanced Information Management

...interdisciplinary group of forward thinking innovators, and an interoperable electronic medical record system that includes standard nursing terminology. The technology needed in this scenario that would make this combination successful consist of network security measures to ensure security of protected health information under the federal requirements of HIPPA and HITECH. The use of emerging technology such as cellphones, tablets and remote technology should also be included in the discussions of creating a telehealth system that would accommodate both of the combining organizations. Telehealth not only includes communication between patients and healthcare providers, but also communication between healthcare providers in both of the combining organizations. Video conferencing can save healthcare providers time and money by allowing them to collaborate with one another without being physically near one another. A3. Identification of Team The interdisciplinary team on the project committee will consist of four team members. Team member A would be the project team lead in which I would nominate myself. It is important to have a nurse as project team lead because they understand the needs of the patients, the work flow of the unit and also how the system will affect those working at the point of care. The project lead should be an experienced nurse who is proficient within their specialty of nursing and is comfortable in a leadership role. The role of the project team lead can make...

Words: 3168 - Pages: 13

Premium Essay

Anthem Health Data Breach

...street addresses, and email addresses, according to a statement from Anthem president and CEO Joseph Swedish posted on the company website. Employment information, some of which included income data, might also be at risk in the Anthem health data breach.2014-11-13-163188459 “Based on what we know now, there is no evidence that credit card or medical information, such as claims, test results or diagnostic codes were targeted or compromised,” Swedish said. “Once the attack was discovered, Anthem immediately made every effort to close the security vulnerability, contacted the FBI and began fully cooperating with their investigation.” Swedish added that the personal information of Anthem employees, including himself, were also compromised in this data breach. It was a “very sophisticated external cyber attack,” according to Swedish, and despite Anthem’s best efforts and “state-of-the-art information security systems” its IT system was breached. “We join you in your concern and frustration, and I assure you that we are working around the clock to do everything we can to further secure your data,” he said. Anthem will notify the current and former customers who may have had their information compromised, and will also offer free credit monitoring and identity protection services to those who were affected. “I want to personally apologize to each of you for what has happened, as I know you expect us to protect your information,” Swedish said....

Words: 1389 - Pages: 6

Premium Essay

Cybersecurity Policy Issues

...rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users. INTRODUCTION From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the...

Words: 1930 - Pages: 8

Premium Essay

Emerging Cybersecurity Policies in the Federal Government

...Emerging Cybersecurity Policies in the Federal Government Information Assurance Officer and Risk Management Analyst Department of Defense. Emerging Cybersecurity Policies in the Federal Government Information Assurance Officer and Risk Management Analyst Department of Defense. CSEC 655 UMUC Individual Assignment 1 September 16, 2014 CSEC 655 UMUC Individual Assignment 1 September 16, 2014 Table of Contents Emerging Cybersecurity Policies in the Federal Government 3 Emerging Policies and Practices 4 Defense in Depth (DID) 5 Security Risk Frameworks 6 Test Driven Development 8 Business Service Frameworks 9 Acceptance and Preparation for Failure 11 The Federal Government and these Emerging Policies and Practices 13 The Feds and Defense in Depth 14 The Feds and Security Risk Frameworks 14 The Feds and Test Driven Development 16 The Feds and Business Service Frameworks 17 The Feds and Acceptance and Preparation for Failure 19 How could the Feds continue to improve 20 References 22 Emerging Cybersecurity Policies in the Federal Government One of the largest and most important enterprises there is to protect in the cyber security realm are the various networks that make up the federal government. This massive undertaking to secure the systems, networks, and data of the various governmental agencies is a never ending uphill battle. The requirements of the federal government enterprise to be globally far reaching, as well...

Words: 6354 - Pages: 26

Premium Essay

Private and Public Sector Cyber Security Needs

...Private and Public Sector Cybersecurity Needs George Gritten Table of Contents Executive Summary 3 Introduction 4 The Current State of Cybersecurity 4 The Evolution of Cybersecurity 7 Moving Towards a More Secure Tomorrow 9 Conclusion 10 References 11 Executive Summary Today’s world is quickly evolving into a world that relies solely on technology as a way to do business and communicate. With this move towards a technology-centered society, both public and private sectors have to keep up with and evolve just as quickly, while trying to be proactive when it comes to security. The world today is not as safe as it once was, and as it changes to a more paperless, technological-based society, access to information is becoming increasingly accessible. With this, cyber-attacks and security breaches have become a significant risk of doing business. As hackers, botnets, and various other cyber-based threats have become progressively more malicious and continue to attack organizations and governments alike, a prevailing question is how to unite the public and private sectors so that they can evolve to defend against that which they cannot see. Introduction Today's reality is rapidly advancing into a world that depends exclusively on technology as an approach to work together and connect. With this move towards a technology-focused culture, both government and private sectors are needing to stay aware of and develop almost as fast, while attempting to be proactive...

Words: 2198 - Pages: 9

Premium Essay

Secuirty Term Paper

...is advancing ever year and people are just trying to stay up to date, but there are those in the world that make it there life to stay up on technology but in all the wrong ways. The people that are just every day users of technology do not see the people in the background hoping to gain access to their private information. As technology advances so must the ways people protect their private information; even in places that they think are new and untouchable to the normal person. Even the most technology educated person can fall victim to cyber-attacks and lose of personal data. As technology advances the world of computer security will also change; the word computer is not just referring to a desktop computer that sits a desk but now refers to your tablet, smart phone, and even smart watch. The way that personal data is saved is not just limited to a floppy disc or even a CD-ROM anymore, but now a day there is clouds that will have personal data stored from all over the world sometimes in one location. The discussion in the review below will give more detail on what is coming for technology and as well as how technology is being used against people to receive their personal data. Literature Review Technology is estimated to move even more rapidly within the next twenty years and this all new growth starts this year; with this happening it means that 2016 is said to be the most year for new cyber security and personal computer security. Everything is changing in today’s world...

Words: 1825 - Pages: 8

Premium Essay

A Key Concept in Information Systems

...Computer and network security has become very important to businesses, government, military, and individuals. Many companies have been compromised and personal information obtained and used without authorization. It is very important to have computer and network security to keep hackers and malware from collecting data and destroying a computer system and network. Computer security protects all of the data that is stored on your computer. Every component should be protected that includes hardware, software, and data. The history of Network security started when hacking crimes started in the 1980’s. Robert Morris was a computer hacker that released a worm that affected 6,000 computer systems. It created a large monetary financial lost because of a computer worm. The Computer Emergency Response Team (CERT) was said to be form after the attack to inform users they had security problems. ”The Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) leads efforts to improve the Nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the Nation while protecting the constitutional rights of Americans (US-CERT).” Hospitals have major concern in protecting computer and network security. The information in hospitals have very valuable information such as patient records, social security...

Words: 1025 - Pages: 5

Premium Essay

Varying Network Security Methodologies and Their Effect on Attack Frequency

...Varying Network Security Methodologies and Their Effect on Attack Frequency John D Prather College of Southern Nevada Abstract This paper will examine the efficacy of the current methods to assess network security intrusions, and their associated losses. The only true security in an ever-more interconnected world is complete anonymity … the more robust one’s network security is, the bigger the target for unintended use. While unintended use can be benign, it can also be malicious. Years ago, if a computer network was compromised as part of a criminal act, it was often tertiary to the crime itself. Today, the data is the target, and the network intrusion the crime. Billions of dollars have been invested in security products such as firewalls, strong authentication, intrusion detection, and encryption over the past decades. However, system penetration attempts continue to occur. As a consequence financial losses continue to skyrocket for organizations. According to the 2012 CSI Computer Crime and Security Survey, average losses per respondent topped $2,500,000 for the year, with some intrusions causing losses topping $25,000,000!! (Richardson, 2012) It is not that security countermeasures are ineffective for companies that employ them correctly … it is that the pool of perpetrators, from basement teens to nation-states, is so large and the chance of being punished so absurdly small, that the cost-benefit-analysis to the criminal mind swings heavily in the direction...

Words: 842 - Pages: 4