StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Importance of Security in Cyberspace - Essay Example

Cite this document
Summary
The author of the paper under the title "Importance of Security in Cyberspace" will begin with the statement that the advent of information and communication technologies has come along with benefits as well as limitations to the users…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful

Extract of sample "Importance of Security in Cyberspace"

Security in Cyberspace Student’s Name Institution Course Title Date of Submission Security in Cyberspace Introduction The advent of information and communication technologies has come along with benefits as well as limitations to the users. Large companies and individual users have both suffered the negative impacts that have been created by the continued use IT devices and methodologies. In the current society, the main challenge in the cyberspace or the internet platform is that of security risks. There are numerous limitation and drawbacks that have resulted from cyber-attacks both to individuals and also to organizations. As a result of the losses and damages that have been caused by the numerous internet security risks, various solutions have been adopted in order to bring the situation into control. Each of these proposed solutions has its own benefits as well as limitations that come in different perspectives. Importance of Security in Cyberspace It is important both to organizations and individual computer and internet users to take care of their devices and data security. This is necessary to ensure data is kept in its accurate, relevant, timely and usable form (Government of Canada, 2009, p. 09). It is also important to uphold referential integrity within the computer networks and to prevent any prevalent risks from occurring within an organizational database. Application of cyber-security measures also helps in keeping the devices used in the IT departments safe from both hardware and software damages. In the long run, all these measures help the users prevent unexpected losses that come along with rectification of the damages and losses caused by cyber-attacks. Cyberspace Security Requirements Cyberspace security options are installed from two dimensions. One approach is the installation of a security program in response to damages that were caused by a previous attack on the premises of an organization. The other way is installation of security measures so as to prevent possible future risks that the devices within a network are exposed to. Cyber-security, also referred to as information technology, focuses more on protecting personal computers, networks, programs and data from unauthorized access, alteration or loss. Governments, military organizations, financial corporations, big health institutions and other business organizations have suffered the impacts of cyber-attacks. Some of the measures that have been put in place to bring the situation into control are outlined below. Some of the advantages and disadvantages of each mechanism are also discussed briefly and precisely. To begin with, data protection requires that the databases and other sensitive files be password protected. Strong passwords that are not easily hacked or predicted can keep the organizational files free from unwanted access (Hohlbaunm, Schwyter & Alvarez, 2011, p. 03). Malicious entry into organizational databases can be prevented by the use of very strong passwords. These access codes may also be used in organizational networks to avoid internet attacks that may cause theft of sensitive information. The advantage of using these strong passwords is that not all the unwanted entrants into private organizational files are professional hackers. The use of strong passwords is associated with data loss in the event that the creator of the codes is not in a position to remember the access codes. This is in the case of very long passwords that are a combination of alphanumeric characters and special symbols. In a case where a user is not able to recall a Personal Computer’s password, the PC may have to be re-formatted and this may lead to data loss to the organization or individual. The second strategy that can be put into application is to install a strong firewall. This is mainly for the protection of networks from malicious software applications. The mechanism that is used by a firewall to ensure safety within a network is by controlling internet traffic that comes into a network and flowing out of the organizational network. There are several firewall programs that can be purchased in the market today in order to regulate internet traffic and prevent illegal entry. The main benefit of installing firewalls is that it limits entry into the network to the persons allowed to be within the network. Phishing is a network challenge in which illegal users make way into a computer network to steal sensitive information such as access codes and trade secrets (Cyber Security, n.d., p. 08). Through the use of strong firewalls, these risks are minimized, and in some cases fully prevented. Firewalls have the limitation of cost associated with acquisition and maintenance. Currently, most of the firewall programs require frequent updates, and these come along with cost implications. Installation of virus protection software is another security measure that needs to be taken into consideration. There are numerous viruses and Trojans that are designed with the intention of corrupting the files that reside within a database. Some viruses may cause the entire organizational database to break down. As a result, the need to acquire the most recent, updated and strong versions of antivirus software is recommended. Most computer viruses often come along with downloaded files and programs and install themselves automatically when these files are opened or run. The benefit of using antivirus and anti-malware programs is that they are capable of protecting the organizational files from damage caused by the computer viruses. The extent of protection depends on the version of the antivirus used. Some of the most common antivirus programs installed by companies today include AVG Internet Security, Smadav, Kaspersky Internet Security, Avast Antivirus and MacAfee antivirus. These antiviruses are also expensive to acquire and maintain. In addition, there are clone versions of these applications in the market. Most of the users find it challenging to determine the original versions of these applications from the vendors. There is also need to regularly update programs in the computers. The most important of all the applications that run in a PC is the operating system on which all the software is installed. Ensuring that all the applications in a PC are regularly patched and updated is an important step towards ensuring that the files and programs are safe from accidental threats. The more frequent the updates, the higher the safety levels. This is also important to the security programs that are in use by the organization. Physical security measures are also recommended by the organizations and individual computer users. There are instances where data may be stolen in the course of forced entry into a company’s premises. Portable devices such as laptops, modems, external storage devices, internet hubs and connection cables among other gadgets may be stolen from the organization. As a result, the rooms in which these devices are stored require strong reinforcement and installation of security alarms at strategic points. This is important in controlling forced entry into the storage areas. Physical damages may come on other dimensions such as from natural disasters like fire outbreaks. Fire extinguishers need to be located strategically to reduce the extents of losses that may be realized due to such disasters. Internet devices may be brought down by these instances and may cause damages remedies of which may not be easily applicable. Data encryption is another way to protect data that is in the process of transmission from the source to destination. Encryption is the process of altering the nature and on-sight appearance of data being transmitted. Special encryption software has to be used to prevent illegal access and use of the data and information being transmitted. At the destination, the content of the file can be retrieved only once decryption software is used. Decryption is the process of getting back then information tom its initial state as developed by the sender. Decryption software are easily acquired and installed. They are more cost effective since they do not require regular updates as in the case of anti-virus and anti-malware programs. Due to the limited amount of money that can be used to set them up, organizations prefer using the encryption-decryption approach to management of files in transit. The internet is a risky forum in which several ill-motivated operations take place and files in transit may not be easily protected from illegal access. This calls for encryption. Data losses result from theft, virus and malware attacks, hacking, phishing, physical damage and other security risks. Consequently, there is need for regular file back-ups. Other than storing data in central locations, organizations often recommend the use of secondary storage media just in case of data loss. Cloud storage is another important initiative that has now been put into use to prevent data loss. The benefits of creating back-ups through the use of cloud storage technology include unlimited storage space; ease of access and cheaper alternatives compared to the costs involved in the acquisition of external storage devices. It is also safer compared to external devices that may easily crash or get lost as well. These external storage devices are also likely to be corrupted by entry of computer viruses are other harmful programs. There are other strategies that can be used to take care of security in cyberspace. The installation of intrusion detection and intrusion detection software is essential in avoiding illegal entry into a network (United States Department of Energy, 2010, p. 6). Intrusion may be for very harmful reasons. There are many of this type of software that is available in the market today. It is more recommended to go for the most reliable and updated versions of these programs. This would help in barring illegal entry into private networks. The Canadian Government Hacking, February 2009 A case study in the violation of the measures that need to be taken into consideration in combating cyberspace attacks was witnessed in Russia in the year 2009 (Balkhi, 2013, p. 01). This took place when foreign hijackers with IP addresses from China attacked the most important government networks with a view to acquiring sensitive information. The hijackers were in a position to infiltrate three departments within the Canadian government. As a result, classified government information was transmitted to unauthorized users. This led to Canada cutting down the entire network of these three departments to prevent further entry into secret government records. The damages were costly in terms of information credibility and referential integrity was completely lost. Other constraints came in the form of costs since the government had to set up new networks in the three government departments and put in place more security solutions. Proposed Solution to Cyber Insecurity In an own perspective, it is recommended that a constant review into the structure of a computer network within an organization be taken into consideration. This requires regular troubleshooting to ensure that any weak points within a computer network are taken care of. Troubleshooting has the benefit of cost-effectiveness. The programs that are used in troubleshooting are less costly and in most cases come with the software programs in the course of acquisition of the programs. As a result, it becomes more recommended to troubleshoot databases and private networks. In the event of any problems detected, the solutions may come in the form of enforcement of some of the security requirements that are discussed in the above section. There are challenges that may be realized by the use of constant troubleshooting as an approach to maintaining security within a computer network. In the first place, some problems may not be easily detected. In addition to this, some troubleshooting applications may not provide recommended solutions to the errors that may be detected in the networks. In this case, there may be need to go for more improved solutions and this may come along with cost implications on the organization. Troubleshooting also takes time that could otherwise be put into more profitable activities. Conclusion The 21st Century crime takes place mainly over the internet. There are losses that financial institutions and other government institutions have experienced as a result of these attacks. In addition, individual computer users have also been victims of internet fraud (Shaw, 2006, p. 241). As a result of the cases that have been witnessed in the past, such as that of the Canadian government, it is recommended that all the security options outlined above be taken into serious implementation. It is more important to prevent the attacks than take control mechanisms once the damages have been realized. Despite the cost issues related to the attacks, it is appropriate to uphold data security and integrity. Bibliography Top of Form Balkhi, S,2013, ‘25 Biggest Cyber Attacks in History’, viewed 27 August, 2014 Cyber Security , n.d., ‘The Cyber Security Handbook, New Jersey of Consumer Affairs’ Canada, viewed 27 August, 2014, Government of Canada , 2009, ‘Canada’s Cyber Security Strategy’, For a stronger and prosperous Canada, Government Publication Canada, viewed 27 August, 2014 Hohlbaunm, F., Schwyter, P. & Alvarez, F 2011, Cyber Security Requirements and Related Standards for Substation Automation Systems, International Council on Large Electric Systsms Argentina-Buenos Aires: viewed 27 August, 2014 Shaw, W. T. (2006). ‘Cybersecurity for SCADA systems’. PennWell Corp Tulsa, Okla,. United States Department of Energy 2010. ‘21 Steps to Improve Cyber Security of SCADA Networks’, Government Publication New York, viewed 27 August, 2014t Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security in Cyberspace Essay Example | Topics and Well Written Essays - 2000 words, n.d.)
Security in Cyberspace Essay Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/information-technology/2064220-security-in-cyberspace
(Security in Cyberspace Essay Example | Topics and Well Written Essays - 2000 Words)
Security in Cyberspace Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/2064220-security-in-cyberspace.
“Security in Cyberspace Essay Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/information-technology/2064220-security-in-cyberspace.
  • Cited: 0 times

CHECK THESE SAMPLES OF Importance of Security in Cyberspace

National Initiative for Cyber Security Education

importance of NICE framework Based on the ever growing use of the internet, there has been the need of knowledgeable and talented individuals to protect, safeguard, as well as preserve various information structures set up and implemented within the country.... Proposed Examples There are a lot of examples that can be used to describe the importance of this initiative in cyber security.... Secondly, educating students and other individuals on the importance of securing personal information such as names, national security numbers, and bank information would prevent identity theft....
3 Pages (750 words) Assignment

CJ452 Security Planning and assessment

Advanced security and anti-virus programs should also be installed in computers to prevent hacking and other data theft in cyberspace.... The history of security services can be traced from the time of the grandeur of the Roman Empire.... There are five types of security concerns: threat to life; to public health and safety; to property; to reputation, privacy and civil liberty; and to government and administration.... From being firefighters, security services in the earlier times have gradually transformed into curbing of criminal activities that have become more sophisticated and become more organized over time....
4 Pages (1000 words) Essay

Technology in Policing

in cyberspace, such identity theft may make way for further offences.... Like Newburn says that in cyberspace three acts of trespassing occur, that involve viruses that immediately attack or attack at a later date citing the example of the shut-down of websites of yahoo, Amazon, ebay, and CNN which incurred a loss of 1.... The word crime and security have reached a high level of sophistication in the present.... What are the monitoring approaches that can be fathomed by the state and the court or by the security organization In 2007, the US Federal Trade Commission reported that 8....
4 Pages (1000 words) Essay

Unauthorized Access to a Computer System and Defensible Networks

Hacking Exposed: Network Security Secrets and Solutions, McGraw Hill, CA,1999, p 3 – 28Shell, Petruske (2014) cyberspace milestone reached for Air Force Network.... For example, if someone is involved in criminal operations and security agents feel that getting into his system without his permission maybe the way to get evidence against him then that will be ethical.... Ethical hacking is a good practice as it helps companies to enhance security of their computer system....
1 Pages (250 words) Assignment

Cyber Attack Issues

In the recent past, a new occurrence in the technologically interconnected world related to computer security called cyber… Cyber attack refers to the use of computers and the internet to carry out warfare in cyberspace (Schiller 5).... Cyber attack refers to the use of computers and the internet to carry out warfare in cyberspace (Schiller 5).... In defining the legal issue, it is vital to know what constitutes an adversarial attack in cyberspace....
1 Pages (250 words) Essay

Most important system of critical national infrastructure

Although there are other important infrastructures such as transportation and power, they would not function properly in the absence of security.... Although there are other important infrastructures such as transportation and power, they would not function properly in the absence of security.... Governments must also create awareness programs to help even the private sector to fight and report intrusions (The National Strategy to Secure cyberspace, 2003)....
2 Pages (500 words) Essay

Emergency, Exception and New Technologies in International Relations

This emergence is caused by the fact that Information Technology, IT, has become… Vulnerability of cyberspace emerges in that parties who are not authorized to access any adversaries in cyberspace can devise means of In it, malicious actions such as usurping, destroying, altering, disabling, or damaging them occur.... The increasing importance of IT, though very beneficial when applied, has dragged along a detrimental side to it.... This is because these interventions (instruments) are outdated in that cyberspace is a new technology as compared to their establishment time....
4 Pages (1000 words) Essay

Privacy Issues Related to Cyberspace

The use of internet has several issues that may be raised in regard to privacy (Privacy in cyberspace: Rules of the Road for the Information Superhighway, 2004).... However, these privacy issues may be protected through different policies and measures that business organizations in the present times have well learned to incorporate in their systems (Privacy in cyberspace: Rules of the Road for the Information Superhighway, 2004).... The present study has considered three organizations- IBM, Microsoft Corporation, and Oracle Corporation - and conducts learning on their privacy policies and the effectiveness of these policies in protecting the information in the cyberspace....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us