It Security

Topics: Security, Information security, Computer security Pages: 6 (1949 words) Published: January 12, 2013
Computer security and Network Security is the means by which business and governments are protecting against computer intrusions and attack to prevent loss of data, information and provided services. Everything is now on computers, peoples whole lives are documented on computers. Big business and the government rely on technologies that use computers, whether it is used for storage, a medium between the customers and themselves or actual work. With all this information and data being stored, transferred and used it needs to be secured. A bank is open to the public; you would not have this bank unsecured would you? There would be security guards, cameras, and a vault. The same mentality to secure your data should be implied if you have a network that is connected to the Internet. You should have software, hardware, and/or personnel monitoring your networks operations and security. All computers and systems that connect to the internet or networks run off software of some type. People called hackers or crackers, manipulate programs, create worms, and viruses to make systems do thing there not supposed to, access places they aren’t allowed, and shutdown or hinder a system from working properly (Dasgupta). Then there are attacks, phishing attacks which come in the form of email that try to lead you to fraudulent sites, Denial-of-service attacks overload servers causing no one to get on or shuts them down. Then there are SQL injection attacks which are used in security vulnerable web apps, it’s a code that pulls information from the database and sends it back to the hacker, these are just a few of the many threats posed today by hackers ("Top Cyber Security Risks- Origin and Destination", 2009). Cyber security threats are on the climb as cyber criminals persist to increase innovative ways to use breached computers for their own personal agenda. Establishments all have different types of information they need to protect, the government has information that might jeopardize national security whereas a bank has personal information pertaining to its customers. All parties should understand the likely growth of the threat environment and develop an appropriate security strategies and procedures to address these evolving threats. All networks and organizations have weaknesses in there infrastructure, whether it is internal or external all risks cannot be mitigated. Studies show security of information and data has always been important, today it is cyber security and by understanding what we are securing against , we can strategize and prepare for the threats of cyber terrorism, cyber crime and cyber warfare. The birth of the internet, came from a project from the Defense Advancement Research Projects Agency Network, it was known as the ARPANET. Established in 1969 ARPANET served as a test-bed for new networking technologies, linking many universities and research centers. The goal was to connect a lot of computers together spread across the United States by way of communication lines and be able to pass data back and forth. The internet now connects the world as one huge cyber network, and play a major role and part in modern society. The internet is used for many different things, information, shopping, online education, banking, and even complete businesses existing only in the cyber realm (Abbate, 2000).

Every time you go to the bank, or make a call on your cell phone, there is a computer network somewhere in the process being used. The security of communication of computers, technologies, networks and the storage and transmission of data that's in a digital format is called cyber security. Cyber security goes by allot of different names, information security, computer security, information assurance , but its main meaning is to secure and make cyber space secure from cyber threats (Dunn, 2011). In order to have an efficient cyber security structure you must take the full approach. many organizations...

References: Abbate , J. (2000). Inventing the internet . Cambridge : MIT Press Retrieved from history
Dunn , M
Jameson , R. (2008, October 16). October is national cyber security month. Retrieved from and Events/News Archives/en/2008/en-10162008-cyberchamp-DuBoseGood.aspx
Thomas , D
Travers, M., & Black & Veatch , (2008). Cyber security.Transmission& Distribution World, 60(11), 23-27. Retrieved from
Dasgupta, P
Top Cyber Security Risks- Origin and Destination. (2009). Retrieved from
Lane, S
Baker, W., Tippett, P., & Goudie, M. (2010). 2010 Data Breach Investigation Report. Retrieved from
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Common Information Security Threats Essay
  • E-Commerce security Essay
  • Cyber Crime and Security Essay
  • Cyber Security Essay
  • cyber security Essay
  • Security in the News Essay
  • Security Crisis Solved: More Secure Logins, Not Sharing Personal Information, and the Use of Encryption Software. Essay
  • Essay about Multi-layered security Plan

Become a StudyMode Member

Sign Up - It's Free