Custom Essays, Research Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: September 7th, 2024

Security Threats

Computer Sciences and Information Technology
Security Threats
Read Top Ten Security Risks for 2019 (Links to an external site.) and research three security threats using credible sources (scholarly journals and articles). In a two- to three-page MS Word document, be sure to:
• Be sure to:

o Identify and describe the three security threats you selected.
o Describe how the threat manifests itself?
o What security mechanism would you use to mitigate each threat?

Security Threats
The nature of security threats in recent decades has shifted from being entirely physical to online threats. The increased use of the internet coupled with the high rates of its advancement has given birth to both positives and negatives. The recent study Cisco showed that cybersecurity is what organizations should watch out for which creates the need to increase protection and prevention measures.
Among the top 10 security risks identified were hacking, insider threats and the Internet of Things (Kingori, 2019). Hacking is the attempt to illegally get into a computer system or private networks without the knowledge or authorization of the owner. The main aim of the hackers is to break into the systems to alter or steal the information. There is a financial gain attached to hacking into the systems which act as the motivation behind the criminal activity by the hackers. For example, breaking into the banking systems and stealing credit card information or altering the banking systems can allow a hacker to transfer money without the knowledge of the bank.
Internet of Things (IoT) is among the newest technologies that enable communication between computing devices and systems (Jie et al., 2013). It is possible to transfer data across networks without the need for human-to-human interactions. Today, many homes in affluent communities make use of smart home technology which is only made possible by the IoT. The technology allows the communication between the electricity systems and the owner’s mobile device such that by the click of a button on the mobile phone, a homeowner can switch off the lights at home even when miles away. Insider threats refer to malicious attacks on the computer systems of an organization by people within it. It could be the current or former staff or associates with inside information about the systems and security practices of the organization.
Hacking involves an unknown person behind a computer who gets into the systems of the target and retrieved information that is then used to alter or to manipulate the target. The hacker may choose to blackmail the target and request for a ransom when they get hold of very sensitive information. An IP address could be all the hacker needs or an obvious password for them to get into the systems. IoT involved the storage of a lot of personal information into the systems. A hacker gets into the systems and retrieves data such as the current location of a homeowner and then plans on a home break when the owner is away. Insider threats are very common when a mole gives out organizational passwords of the rivals who then hack into the systems causing damage which will slow down the growth (Dalal, & Gorab, 2016). The rival company then gets an opportunity to grow and pass the target company which happens mostly with business empires.
Cybersecurity threats have a major common cure that works across all the existing threats. Training employees on the safe use of the internet and the computer systems should be the top priority measure which will work as a preventive action (Gunkel, 2018). The other most important action that companies should take is adhering to the cybersecurity both the national and organizational cybersecurity standards. For example, using a two or three-step authentication process and not sharing passwords should be strictly used and sanctions put in place for any employee that breaks the rules. Lastly, it is important to invest in computer systems that can detect and warn of an incoming threat which with the help of the well-trained staff will save the company from the damage of the attack.
It does not matter whether a company or an individual has faced a cyber-threat before or not, the reality is at one point, they will be open to the dangers. It is necessary to put heavy preventive measures to avoid the damage that could be caused by a cyberattack.

References
Dalal, R. S., & Gorab, A. K. (2016). Insider Threat in Cyber Security: What the Organizational Psychology Literature on Counterproductive Work Behavior Can and Cannot (Yet) Tell Us. In Psychosocial Dynamics of Cyber Security (pp. 122-140). Routledge.
Gunkel, D. J. (2018). Hacking cyberspace. Routledge.
Jie, Y., Pei, J. Y., Jun, L., Yun, G., & Wei, X. (2013, June). Smart home system based on IoT technologies. In 2013 International Conference on Computational and Information Sciences (pp. 1789-1791). IEEE.
Kingori, D. (2019, January 17). Top 10 Cybersecurity Risks for 2019. Retrieved from https://www.uscybersecurity.net/risks-2019/

Order | Check Discount

Tags: PSY Papers, Psych Research Paper Sample, Psychology Assignment, Psychology Dissertation Writing, Psychology research paper

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Nursing Essays, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.