Cyber Security Issues
Cyber Security Issues

Cyber Security Issues

Available Only on StudyHippo
Topics:
  • Pages: 3 (1198 words)
  • Published: November 18, 2021
Text preview

Introduction

The internet has significantly transformed the lives of the people in the digital age. Majorities of the people in different parts of the globe are connected, and the impact of the internet is ever growing. The open internet has improved the efficiency of the business. It has also enabled individuals to conduct business with ease in various parts of the world. However, internet use has been faced with numerous security challenges. The issue of cyber security has been a controversial issue globally. It has become complex with the emergence of new technologies and advancement of existing ones. Organizations continue to invest heavily in cyber security, but they are still losing a lot of money to cyber criminals. Cyber criminals use different techniques including the sophisticated ones to gain access to the data of individuals and organizations. Nevertheless, various measures can be used to address the issue of cyber security. Legislation, technology, and others measures can be used to enhance cyber security to protect malicious acts of the cyber criminals.

As Bayuk (212) explains, when an electronic gadget has an internet connection, it becomes prone to intrusion. The great number of successful attacks from cyber criminals happens against the servers already with an internet connection. Most of the corporations put a lot of effort to install firewalls and other security systems. However, hackers continue to explore and test the installed firewalls and computers

...

that are networked. Thus, the outcome is an increase in the clash between the owner of computers who want to secure their systems and have control and the criminals who are after the secure data for their own use. It is hard to determine the manner in which hackers are successful in executing their mission given the fact that a significant number of them escape without being reported (An Interview With MichaelRogers 85). Competition prohibits corporate from sharing data that has been involved in intrusion hence hampering efforts to collaborate and embark on approaches to curb cyber threats.

The motives for the cyber criminals to have control over computers from various dimensions vary with time. Some years ago vandalism was the main motivation for cybercrime (Vacca 118). The issue keeps on evolving with time with the main drivers such as to extorting money from the victims, stealing financial details such as passwords as well as other information that may be used to commit cybercrime. The techniques used to gain access to the information stored online continue to evolve as new technologies emerges. For instance, it is evident that the techniques that were used by hackers in ten years ago are not the one used today. Those techniques have been sophisticated to enable criminals various overcome security measures known as anti-malware utilized by both individuals and organizations to protect their data.

Professional organizations for committing cybercrime, state-sponsored groups as well as political hacktivists are using advanced technologies that outpace resources and expertise of the security personnel of the organizations (An Interview With Michael Rogers 83). In most cases, hackers offer services of cybercrime for pay, and this continues to escalate the crimes.

View entire sample
Join StudyHippo to see entire essay
View entire sample
Join StudyHippo to see entire essay

Today, it is hard to trace malware, and it is usually customized to gain access to the information which is useful to the hackers for financial gain. Some of the organized crimes are funded in a better way than the security operations of the victims, and this makes such crimes successful.

The IT systems are built by many IT professionals, but these systems suffer from attacks every day. The reason is that the individuals that design the system stack from the application to the network components as well as hardware (Spalevic 687). This makes it easy to introduce a human element involved in the design to introduce flaws in the system. Hence, most of the organizations have a defense to protect their systems, but they are always vulnerable to the attack. Additionally, organizations are expected to perform their activities in a more open way than in the past. Employees performing their roles in different units are insisting on gaining access to the networks of the corporate using the communication devices that are used for personal purposes. A majority of the people has become fanatics of smartphones which have increased connectivity, but they have presented additional threats to cyber security. Hackers are cracking the devices, and this offers an easy way of access to the networks of the corporate for malware.

In my view, cyber security is complex with the emergence of new technologies and advancement of existing ones but various approaches can be taken to mitigate cyber threats. One of the approaches is formal validation and testing. The measure involves testing of the system to identify any fault that may provide an opportunity to attack (Vacca 124). The approach can employ functional testing to ensure the validity of the system. Penetration testing can also be used to identify its flexibility to specific attacks as well as resilience testing. Nevertheless, for interconnected systems, it is not possible to test it and hence formal validation is hardly enough.

Diversity over uniformity is another approach that can be used to mitigate cyber threat issues (Bayuk 213). The systems are subject to infection using the malware. If the system has the same structure of design, then it becomes highly susceptible to infection. Diversity implementations of cyber systems make it difficult for the whole system to be vulnerable to the attackers. In many organizations, it is common to find systems being homogenous in the implementation instead of being diverse, and this makes them prone to the vulnerabilities and faults. Implementing redundant system differently from the primary implies that the two have a varied degree of resilience to the attacks by cyber criminals. Thus, as Spalevic (692) argues, it is necessary for the organizations to use heterogeneous implementations to reduce the risk of the attacks. The approach would make it difficult for the whole system to be prone to the attackers and hence improving the security of the corporate networks.

Conclusion

Protection of digital data has become a critical issue for the organizations. In the digital age, organizations have invested heavily in cyber security to ensure their information is protected from unauthorized people. However, investing heavily in cyber security does

View entire sample
Join StudyHippo to see entire essay