We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

The Main Function of Cyber Security Essay

Operation AuroraAmericans are becoming heavily dependent on modern day technology, which produce more vulnerability to cyber-attacks such as security breaches. Cyber security, also known as information technology security, is information security as applied to computers and computer networks. It is designed to protect networks, programs, computers and data from attacks. These attacks can lead to damages or unauthorized access to data. Computer security also includes protection from unplanned events and natural disasters.

Cyber security main function is to guard computers, networks, programs and data from unintended or unauthorized access, change or destruction.Confidential information on computers is collected, processed, stored and data is transmitted across networks to other computers from the military, corporations, financial institutions and the government. There is a rapidly growth in volume and complexity or cyber-attacks. This requires an ongoing attention to protect sensitive business and personal information, as well as safeguard national security. In March 2013, the intelligence officials believed cyber-attacks and digital spying are the highest threat to national security. Unauthorized movement or disclosure of sensitive information to a party that is not authorized to have or see the sensitive information is known as data breaching.

We will write a custom essay on The Main Function of Cyber Security specifically for you
for only $16.38 $13.9/page

Order now

Between January 2005 and May 2008, there were a total of 227,052,199 records containing sensitive personal information that was involved in security breaches in the United States, according to the nonprofit consumer organization Privacy Rights Clearinghouse. Operation Aurora was first publicly disclosed by Google on January 12, 2010. The attack began in mid-2009 and continued through De. .same time, these attacks are so sophisticated that it becomes hard for even a seasoned security professional to understand whether a link is a good one or a bad one. Many companies looked at their policies and procedures, and they realized that education is one component.

?References Aurora’ Attacks Still Under Way, Investigators Closing In On Malware Creators”. Dark Reading (TechWeb). 2010-02-10. Retrieved 201-02-16. Cha, Ariana Eunjung; Ellen Nakashima (2010-01-14). “Google China cyberattack part of vast espionage campaign, experts say”.

The Washington Post. Retrieved 16 Feburary 201.Gerdes, L. I. (2009). Cyber crime.

Detroit: Greenhaven Press.Tankard, C. (2011). Advanced Persistent threats and how to monitor and deter them. Network security, 2011(8), 16-19.Zetter, K.

(2010). Google hack attack was ultra sophisticated, new details show. Wired Magazine, 14.

Choose Type of service

Choose writer quality

Page count

1 page 275 words

Deadline

Order Essay Writing

$13.9 Order Now
icon Get your custom essay sample
icon
Sara from Artscolumbia

Hi there, would you like to get such an essay? How about receiving a customized one?
Check it out goo.gl/Crty7Tt

The Main Function of Cyber Security Essay
Artscolumbia
Artscolumbia
Operation AuroraAmericans are becoming heavily dependent on modern day technology, which produce more vulnerability to cyber-attacks such as security breaches. Cyber security, also known as information technology security, is information security as applied to computers and computer networks. It is designed to protect networks, programs, computers and data from attacks. These attacks can lead to damages or unauthorized access to data. Computer security also includes protection from unplanned
2019-02-12 08:03:18
The Main Function of Cyber Security Essay
$ 13.900 2018-12-31
artscolumbia.org
In stock
Rated 5/5 based on 1 customer reviews