Get help now
  • Pages 2
  • Words 366
  • Views 534
  • Download

    Cite

    Tod
    Verified writer
    Rating
    • rating star
    • rating star
    • rating star
    • rating star
    • rating star
    • 5/5
    Delivery result 6 hours
    Customers reviews 268
    Hire Writer
    +123 relevant experts are online

    Related Topics

    The Main Function of Cyber Security Essay

    Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get help now

    124 experts online

    Operation AuroraAmericans are becoming heavily dependent on modern day technology, which produce more vulnerability to cyber-attacks such as security breaches. Cyber security, also known as information technology security, is information security as applied to computers and computer networks. It is designed to protect networks, programs, computers and data from attacks. These attacks can lead to damages or unauthorized access to data. Computer security also includes protection from unplanned events and natural disasters.

    Cyber security main function is to guard computers, networks, programs and data from unintended or unauthorized access, change or destruction.Confidential information on computers is collected, processed, stored and data is transmitted across networks to other computers from the military, corporations, financial institutions and the government. There is a rapidly growth in volume and complexity or cyber-attacks. This requires an ongoing attention to protect sensitive business and personal information, as well as safeguard national security. In March 2013, the intelligence officials believed cyber-attacks and digital spying are the highest threat to national security. Unauthorized movement or disclosure of sensitive information to a party that is not authorized to have or see the sensitive information is known as data breaching.

    Between January 2005 and May 2008, there were a total of 227,052,199 records containing sensitive personal information that was involved in security breaches in the United States, according to the nonprofit consumer organization Privacy Rights Clearinghouse. Operation Aurora was first publicly disclosed by Google on January 12, 2010. The attack began in mid-2009 and continued through De. .same time, these attacks are so sophisticated that it becomes hard for even a seasoned security professional to understand whether a link is a good one or a bad one. Many companies looked at their policies and procedures, and they realized that education is one component.

    ?References Aurora’ Attacks Still Under Way, Investigators Closing In On Malware Creators”. Dark Reading (TechWeb). 2010-02-10. Retrieved 201-02-16. Cha, Ariana Eunjung; Ellen Nakashima (2010-01-14). “Google China cyberattack part of vast espionage campaign, experts say”.

    The Washington Post. Retrieved 16 Feburary 201.Gerdes, L. I. (2009). Cyber crime.

    Detroit: Greenhaven Press.Tankard, C. (2011). Advanced Persistent threats and how to monitor and deter them. Network security, 2011(8), 16-19.Zetter, K.

    (2010). Google hack attack was ultra sophisticated, new details show. Wired Magazine, 14.

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need custom essay sample written special for your assignment?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    The Main Function of Cyber Security Essay. (2019, Feb 21). Retrieved from https://artscolumbia.org/the-main-function-of-cyber-security-essay-107988/

    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper