16 Dec 2022

108

Cyber Security: Protecting Your Business from Online Threats

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1767

Pages: 3

Downloads: 0

Abstract 

Enhanced security is one of the indicators of development and growth in a country. The government and the other concerned stakeholders take concerted efforts to guarantee the security of the citizens. In response to this impelling need, world governments have created a robust security system to address any emerging concerns. In a typical government structure, there exist various security systems and branches. Notably, there is the criminal investigations department (CID), forensic department, anti-riot police, and the general police service. In general, the police maintain a country’s internal law and order ( CSRIC, 2011). In higher military levels, the army, navy, and the air forces protect the country from external aggression. All these disciplined personnel work within a close-knit system to ensure the security of all citizens. 

Normally, the size of the security apparatus within any country is influenced by the security needs of the particular country. In a highly volatile situation, the respective countries heighten their security system to avert any looming insecurities (Ganor, 2007). In countries where there is peace, the security system is often relaxed. Recently, however, there have been widespread cases of terrorism that have threatened world peace and order. Criminal acts, mostly arising out of international terrorism and homegrown terror, have caused many world nations to re-evaluate their security systems. Terrorism has scaled to cyber-attacks with frequent attacks on important government and private entities ( Symantec Corporation, 2011). This paper analyzes the trends in cyber-attacks and their influence in governance and communication in general. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Introduction 

In 2001, the United States of America was hit by terrorists who bombed the World Trade Center, leading to massive loss of lives and destruction of property. As a reactionary measure, the United States government heightened its internal security to prevent a possible repeat of the heinous act. The United States government has aligned its internal security system to conform to the emerging trends in security systems and as per the security needs of the American people. Specifically, the Department of Homeland Security (DHS) was created to oversee all internal security operations. The department is concerned with internal security concerns, as opposed to external aggression. In the time the department has been in place, it has achieved great milestones in averting security crises. 

aThe creation of the DHS was more of a reactionary measure. After the heinous act of September 11, 2001, the United States government resolved to create a department to oversee all the security operations in the states. Based on this turn of events, it is logical to conclude that the preceding terrorism activities inspired the idea of DHS. In terms of functionality; however, the DHS was set with the predetermined aim of curbing any criminal, terrorist, or insurgent activities on the American soil. Initially, the department was to oversee and coordinate a national strategy against terrorism and respond to any imminent attacks. The DHS with other security organs have woken to a unique attack, the cyber-attacks. The attacks have not only altered their policies but the mode of security organs operations, some conflicting with the constitutional right of privacy. 

Problem Statement 

There is an eminent increase in computer attacks. Several attacks have been carried out locally and internationally in the United States with various damage capacities. National security institution attacks have been the most common attacks in the past; however, the trend has seen growth in other sectors such the commercial sector, industrial, and scientific areas. Among the most recalled attacks have been Nimda, Slammer, and Code Red. Technological advances and wide use of internet has led a lot of cyber insecurities. Attackers have not only targeted computers but as well as iPod and smart phone users. Cyber security has rapidly grown in the business sector as business owners are fighting to centralize their information system. Organizations are computerizing their systems to allow full adoption of technological control. As a result, potential attack sites are growing gradually. Computer security hence becomes very important tool in ensuring safe technology development. 

Cyber Attacks Nature and Trends 

The internet connects millions of computer devices across the world. It application in business, information exchange, and communication around the world has promoted its penetration every organization and personal computer. The high decentralization of the computer network has promoted cybercrime activities in almost all sectors of computer use. 

There are various modes of cybercrime activities. Cybercrimes include theft of patent rights, fraud, and destruction of intellectual rights. Organizations are built upon trade and intellectual property rights; as a result, they are the key targets criminal activities ( Symantec, 2011) . The introduction of online means of money transfer is the main source of major cyber frauds. Millions of dollars are fraudulently syphoned annually from various directions. Cyber obscenity is among the most popular cybercrimes. Perpetrators hide unwarranted materials, such as pornographic content since they acknowledge the impact of such actions. 

Historically, cybercrimes have been linked to computers; however, a survey by NQ Mobile and National Cyber Security Alliance (2012) highlights that mobile phones’ have shown a rapid growth across the world. Economic Intelligence Survey (2011), in its report adds that today about 4 billion people uses different makes. Among these, 3 billion uses phones for texting and making calls, 1 billion uses smart phones for different internet activities. However, studies show infancy in the smartphone usage growth. However, with the growth of 3G wireless, the growth is projected to be alarming in the next five years. This will be enhanced by the fast pace of growth in the industry and constantly falling prices. Researches have shown a fast shift of technological application behaviour from desktops to laptops and towards smartphones (Economic Intelligence Survey, 2011), Mostly, the influence of internet usage has been the change in the workplace behaviour. Internet has made workplace to become embedded and pervasive on computation power. Smartphones ascendancy in the organizations is associated with work productivity, easy mobility and even increase in home offices due to cyber mobility. Cyber mobility will increase work capacity and competitiveness, however, it will attract numerous challenges to the users and organizations (NQ Mobile and National Cyber Security Alliance, 2012). 

The OMB researchers, (2006) research documented that personal digital assistants, computers, and smart phones enable uses to access internet, email, PS navigation, and several other online applications. Unlike the traditional security systems, the gadgets security has never kept pace with the increasing cybernetic demands. Technical security assistants including antivirus, firewalls, and encryption, are very uncommon applications in mobile phones. Additionally, unlike PCs mobile phones Operating Systems lack frequent updates to keep pace with the recurring nature of threats. The worst part is that most mobile users have no knowledge of the security threats. Most users give little attention to security aids such as antiviruses, and they strongly believe that unlike computers internet surfing through phone offer no threats as compared to PCs (OMB, 2006). 

The enhanced purpose of computers has not only improved individual satisfaction in surfing, data storage for activities such as email passwords, calendars reminders, contact information, and bank details (Economic Intelligence Survey (EIS), 2011). . Corporates sector also uses these portable materials to store data, send vital information and send vital management and marketing information. Essentially, some organizations use these gadgets to make online payments (National Institute of Standards and Technology, 2010). 

Based on Lookout Mobile Security findings, (2011), just like the PCs, mobile phone software can easily be exploited when exposed to untrusted sites or under through attacker’s vulnerability. Attacks have been attempted to crash given application software, eaves drop, or simply to destroy the system. Since users are unaware, such attacks can be triggered by simple clicks to enable a given app (NIST, 2008). Passive attacks are received by installation of a device that exposes a phone to vulnerability or through background networks. Phishers entices computer and mobile uses to give some vital information or install malwares (Based on Lookout Mobile Security, 2010). Phishers that targets emails collects valuable information from PCs, which have better firewall as compared to other electronic gadgets. Phones exposures risks are higher than PCs due to vishing and smishing (malicious voice calls) and MMS and SMS messages respectively. Mostly they attack phones with no advance network and wireless securities. Phishers also trick smart phone users to respond to some ghost charges such as bills and other standing charges. In some cases, they convince the mobile phone users to respond to donations or charity quests (Lookout Mobile Security, 2010). 

A research carried out by Economic Intelligence Survey (2011), indicated that mobile devices and computers have numerous varieties of threats. They range from intentional to none intentional cyber challenges. Usually, unintentional threats come from defective equipment or poor software upgrades the erroneously courses harm to the device data. “Intentional threats include both targeted and untargeted attacks from a variety of sources, including botnet operators, cyber criminals, hackers, and foreign nations engaged in espionage and terrorists” (Economic Intelligence Survey, 2011, p.1). Several factors influence attack capacity such as the actors’ capabilities, their motives i.e. political and monetary gain, and their readiness to act. Given example, cyber criminals use several attack various attack methods to gain access to sensitive data transmitted or stored in mobile devices (Economic Intelligence Survey, 2011). 

The evolution of the internet has changed the way people interact and communicate. Several platforms have been introduced that allow users to link up easily. These platforms include: WhatsApp, Instagram, Facebook, Twitter, and Snapchat . Sending messages or making an internet call is very fast. The increase in social media platforms has been made possible by improved internet connectivity. Friends do not undergo the agony of delayed connectivity, or poor network reception as was experienced in the past. The new communication platforms come with multimedia capabilities. Users can easily attach photographs, videos, or audio files. Besides, one can make a video call through, for instance, Skype. The advanced telecommunication technology has revolutionized interactions, despite its disadvantages. The major setback in improved technology is the ease with which children can access previously restricted content. Specifically, teens have access to porn sites, a factor that contributes to moral decadence. In addition, sexual predators, stalkers, and abductors can utilize information shared on these platforms to harm or blackmail an individual. 

Social media connection present unique cyber problems. While people links up easily through the social medial, unguarded interaction can bring challenge to governments. A perfect example of uncontrolled use of the social media was the Arab revolution. 2011 produced a wave of demonstration across the Arab world. The revolution, which started in December 2010, swept across Tunisia, Libya, Syria, Egypt, Bahrain, and Yemen. The most affected areas were the major cities including Algeria, Morocco, Jordan, and Oman. The key driver to the revolution was social media. 

No one expected such a wave of violent demonstrations in several countries in the 21 st century, especially in none democratic countries. No government though internet can work against it with such rapidity. Both the leaders and the subject never saw the revolution come. In January 2011, the Tunisian president Zine Al Abidine Ben Ali left the country following spirited demonstrations. A month later, Egypt president Hosni Mubarak was overthrown. The revolutions moved to Libya, which lead to the killing of Muammar Al Qaddafi. The waved moved further to Syria, which is still a volatile warzone geared to overthrow President Bashar Al Assad. In Yemen, President Ali Abdullah Saleh was forced to resign as momentum build. It is only in the monarchy of Jordan, where the wave has not succeeded to overthrow the government. Arabs spring to some extent has been viewed as Islamic spring, since across the nations the major players are Islamic parties. Among the countries, Tunisia and Egypt are considered the most successful Islamic Arab Spring counties. Jordan on the other hand, failed in the movement. Arab spring though not categorized as cyber-attack, present a unique problem associated with cybernetic world. 

References 

CSRIC. (2011). Working Group 2A Cyber Security Best Practices , Final Report (Washington, D.C). 

Economic Intelligence Survey (EIS). (2011). Cyber security in the Age of Mobility: Building a Mobile Infrastructure that Promotes Productivity. 

Lookout Mobile Security. (2011). Lookout Mobile Threat Report (San Francisco, Califonia) 

“ Mobile Device Security. (2010). Threats, Risks, and Actions to Take ” (podcast). Retrieved: http://www.cert.org/podcast/show/20100831frederick.html) 

NQ Mobile and National Cyber Security Alliance. (2012). Report on Consumer Behaviours and Perceptions of Mobile Security . Retrieved; http://docs.nq.com/NQ_Mobile_Security_Survey_Jan2012.pdf. 

National Institute of Standards and Technology. (2010). Guidelines on Cell Phone and PDA Security (SP 800-124). http://csrc.nist.gov/publications/nistpubs/800-124/SP800-124.pdf 

OMB. (2006). Memorandum for the Heads of Departments and Agencies: Protection of Sensitive Agency Information M-06-16 (Washington, D.C.: June 23, 2006). 

Symantec Corporation. (2011). Internet Security Threat Report, 2011 Trends. Vol.17 (Mountain View, California). 

Symantec. (2011). Symantec Report Finds Cyber Threats Skyrocket in Volume and Sophistication . Retrieved: 

http://www.symantec.com/about/news/release/article.jsp?prid=20110404_03 

NIST. (2008). Special Publication 800-124, Guidelines on Cell Phone and PDA Security

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Cyber Security: Protecting Your Business from Online Threats.
https://studybounty.com/cyber-security-protecting-your-business-from-online-threats-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Statistics

Scatter Diagram: How to Create a Scatter Plot in Excel

Trends in statistical data are interpreted using scatter diagrams. A scatter diagram presents each data point in two coordinates. The first point of data representation is done in correlation to the x-axis while the...

Words: 317

Pages: 2

Views: 187

17 Sep 2023
Statistics

Calculating and Reporting Healthcare Statistics

10\. The denominator is usually calculated using the formula: No. of available beds x No. of days 50 bed x 1 day =50 11\. Percentage Occupancy is calculated as: = =86.0% 12\. Percentage Occupancy is calculated...

Words: 133

Pages: 1

Views: 150

17 Sep 2023
Statistics

Survival Rate for COVID-19 Patients: A Comparative Analysis

Null: There is no difference in the survival rate of COVID-19 patients in tropical countries compared to temperate countries. Alternative: There is a difference in the survival rate of COVID-19 patients in tropical...

Words: 255

Pages: 1

Views: 250

17 Sep 2023
Statistics

5 Types of Regression Models You Should Know

Theobald et al. (2019) explore the appropriateness of various types of regression models. Despite the importance of regression in testing hypotheses, the authors were concerned that linear regression is used without...

Words: 543

Pages: 2

Views: 175

17 Sep 2023
Statistics

The Motion Picture Industry - A Comprehensive Overview

The motion picture industry is among some of the best performing industries in the country. Having over fifty major films produced each year with different performances, it is necessary to determine the success of a...

Words: 464

Pages: 2

Views: 86

17 Sep 2023
Statistics

Spearman's Rank Correlation Coefficient (Spearman's Rho)

The Spearman’s rank coefficient, sometimes called Spearman’s rho is widely used in statistics. It is a nonparametric concept used to measure statistical dependence between two variables. It employs the use of a...

Words: 590

Pages: 2

Views: 309

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration