Operation AuroraAmericans are becoming heavily dependent on modern day technology, which produce more vulnerability to cyber-attacks such as security breaches. Cyber security, also known as information technology security, is information security as applied to computers and computer networks. It is designed to protect networks, programs, computers and data from attacks. These attacks can lead to damages or unauthorized access to data. Computer security also includes protection from unplanned events and natural disasters.
Cyber security main function is to guard computers, networks, programs and data from unintended or unauthorized access, change or destruction.Confidential information on computers is collected, processed, stored and data is transmitted across networks to other computers from the military, corporations, financial institutions and the government. There is a rapidly growth in volume and complexity or cyber-attacks. This requires an ongoing attention to protect sensitive business and personal information, as well as safeguard national security. In March 2013, the intelligence officials believed cyber-attacks and digital spying are the highest threat to national security. Unauthorized movement or disclosure of sensitive information to a party that is not authorized to have or see the sensitive information is known as data breaching.Order now
Between January 2005 and May 2008, there were a total of 227,052,199 records containing sensitive personal information that was involved in security breaches in the United States, according to the nonprofit consumer organization Privacy Rights Clearinghouse. Operation Aurora was first publicly disclosed by Google on January 12, 2010. The attack began in mid-2009 and continued through De. .same time, these attacks are so sophisticated that it becomes hard for even a seasoned security professional to understand whether a link is a good one or a bad one. Many companies looked at their policies and procedures, and they realized that education is one component.
?References Aurora’ Attacks Still Under Way, Investigators Closing In On Malware Creators”. Dark Reading (TechWeb). 2010-02-10. Retrieved 201-02-16. Cha, Ariana Eunjung; Ellen Nakashima (2010-01-14). “Google China cyberattack part of vast espionage campaign, experts say”.
The Washington Post. Retrieved 16 Feburary 201.Gerdes, L. I. (2009). Cyber crime.
Detroit: Greenhaven Press.Tankard, C. (2011). Advanced Persistent threats and how to monitor and deter them. Network security, 2011(8), 16-19.Zetter, K.
(2010). Google hack attack was ultra sophisticated, new details show. Wired Magazine, 14.