Preview

research paper

Best Essays
Open Document
Open Document
2972 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
research paper
USERS who LACK the KNOWLEDGE of PROTECTING THEIR SYSTEMS

“THE SINGLE MOST IMPORTANT CYBER SECURITY VULNERABILITY FACING IT MANAGERS TODAY”

Bernadette R. Morrison UMUC, CSEC 610 Individual Assessment Dr. Sudesh Kannan March 31, 2013

Table of Contents

Introduction ...............................................................................................................................1
The Internet................................................................................................................................2
Users Who Lack the Knowledge of protecting their systems....................................................4
Why is Knowledge so important? .............................................................................................6
Potential Impacts........................................................................................................................7
Mitigation...................................................................................................................................8
Conclusion..................................................................................................................................9
References.................................................................................................................................10

Introduction
Cyber usage has become one of the leading digital infrastructures that run our world. We use these infrastructures through cell phones, TV’s, ATMs, and most importantly computer networking. Internet usage is growing every year, and every year more and more users log on which has become part of our everyday lives. Unfortunately, as we grow with technology so are those who are willing and able to use the internet against us. Cyber attackers/hackers try to use these resources against



References: BARTHOLOMEW, P. (1998, April 1). Easing TCP/IP network management with novell 's DNS/DHCP services. Retrieved april 29, 2012, from Techcenter: http://support.novell.com/techcenter/articles/ana19980402.html Brodfuehrer, B Dacey, R. F. (2001). Information Security: Weaknesses place commerce data and operations at serious risk: GAO-01-1004T. GAO Reports, 1, 37. Retrieved from http://www.gao.gov/new.items/d011004t.pdf DIPERT, R Evenson, J., Cofsky, J., & Almazan, A. (2010). The Art of Cyber War -- Asymmetric payoffs lead to more spending on protection. Chart. p. 66. Retrieved March 26, 2013 Government Accountability Office GAO Miniwatts Marketing Group. (2012, February 13). Internet World Stats. Retrieved from Usage and population Statistics: http://www.internetworldstats.com/stats.htm Obama, b Plunkett, D. A. (2013, March 14). Are We Ready To Defend Cyberspace? Webinar. Maryland. http://www.umuc.edu/securitystudies/events.cfm Schultz, E Technet. (2013). Security planing. image. Retrieved March 26, 2013, from http://technet.microsoft.com/en-us/library/cc723503.aspx VanDerwerken, J., & Ubell, R

You May Also Find These Documents Helpful

  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Research Paper

    • 449 Words
    • 2 Pages

    I am choosing Cisco company to discuss its information technology roadmap. “The TelePresence Technology Group 's integrated portfolio will consist of the following product groups: Immersive TelePresence: The flagship Cisco TelePresence System 3000 series, including the Cisco TelePresence System 3000/3010 and Cisco TelePresence System 3200/3210, will continue to serve as the optimized experience for scalable deployments.”…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Research Paper

    • 1085 Words
    • 5 Pages

    Considering the introduction of a new product, you are currently in the 34 percent marginal tax bracket with a 15 percent required rate of return or cost of capital. This project is expected to last 5 years and then, because this is somewhat a fad product, this will be terminated. The following information describes the new project:…

    • 1085 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Information is what keeps this seemingly chaotic world functioning systematically. Not so long ago, information was physically present, printed or written on papers. To convey important information or messages, we used letters that took some time to reach its destination. Once our civilization invented and learned how to use electricity to store and send information, we never stopped since. Most of our important information is now being created, stored and sent through vast network of information superhighways. Information security threats were present even before we went digital and information security threats pose much greater…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Research Paper

    • 615 Words
    • 3 Pages

    In week three of my syllabus, my objectives were too differentiate between qualitative and quantitive methods of research. Too differentiate; Qualitative methods provide the context against which to more fully understand those results. They capture what people have to say in their own words and describe their experiences in depth. Qualitative data provides the texture of real life in its many variations; it gives insight into the reasoning and feelings that motivate people to take action. In short, quantitative methods are standardized, systematically obtaining succinct responses from as many clients as possible.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Digital security….the term is almost a paradox in that there is no such thing as security when it comes to secure computing. At best, threats to digital security can be lessened and sometimes prevented but there is no such thing as an impenetrable defense. Corporations are constantly plagued by computer viruses and hacker attacks are on the rise leaving corporate networks vulnerable. It is estimated that 90% of all businesses every year are affected by security breaches to the tune of some $17 billion. Beyond the enormous costs that can easily wipe out a company’s IT budget, there are far-reaching business repercussions. Day-to-day business operations can be disrupted, customers alienated and a Company’s once good reputation tarnished. With the emerging security threats from a Company’s insiders to the sophisticated cyber terrorist, security breaches are clearly on the rise.…

    • 1133 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Govt Ethics

    • 1775 Words
    • 8 Pages

    The purpose of this report is to describe how the government can help private industry to better manage improved cyber security and their responsibility to protect national security through implementing good cyber security controls.…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cyber Threats

    • 641 Words
    • 3 Pages

    Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U.S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Disec

    • 1366 Words
    • 6 Pages

    As the digital age progresses and computers become more prominent, the issue of cyber security comes into question. Governments have taken measures to make guidelines and laws regarding computer hacking within their own countries, but what can they do about issues dealing…

    • 1366 Words
    • 6 Pages
    Powerful Essays