.

Monday, April 15, 2019

Short History on Cyber Space Essay Example for Free

of a sudden History on Cyber Space EssayThe Internet has been designed as a pool of imperishable study for anyone who has access. With its introduction in the mid 1990s, it has vastly changed the way we do business, obtain all kinds of entropy and the way we communicate in the world today. With its sheer potential, we pack created the most powerful tool of our new(a) day technology. In a series of memos that were first written in 1962, by an MIT expert of the break of J. C.R Licklider, he had envisioned a type of network in which a set of computers were globally integrated in sharing randomness and anyone could access information from anyone of these terminals (Leiner, Cerf, Kahn Clark, 1962-1974).The Internet society believe that the Internet should be consumptiond by every(prenominal)one freely, meaning that the number one objective is to promote the development, security and stability of the orbit Wide Web. Malicious attacks much(prenominal) as vir put ons, ema ils, spyware and opposite viscous attacks on hardware and bundle have have well know wide spread through the web. These attacks often result in irreparable disability and abuse the very freedom the Internet principles were based on (Internet security, 2012). Many aspects of our lives include the electronic transferring of data through some means of electronic devices such as cell phones, computers and other diligent devices such as emails and text messaging. Everything from traffic signals, car technology and airport/airplane navigation has been cogitate to the usage of transferring vital breeding via the web and through other communication channels. Government data such as birth records, social security documentation and tax records also requisite to be protected.This information is very confidential and establishes the identity of millions of people in the world today. What exactly is cyber security? In its broadest definition, it is the tax shelter of information and com puter systems in we rely on, whether at work or at school. Information is of the essence(p) and it may not be altered incorrectly. It should only be shared with the appropriate users and intentional parties. at that address are, of course, galore(postnominal) different levels of security. The information must only be accessible to those who need it and have been think to see it, for example, medical records. They should have a different level of security and only be do available to those who need this information such as the appropriate doctors, hospitals, insurance companies and other medical staff. These records need to be well protected to prevent anyone from reservation unauthorized changes resulting in perverting activities.Cyber security is suitable increasingly to a greater extent grave, because every day, new attack methods are being launched and thousands of web pages are observed continuously in the involvement of illegal data breaches. Several examples of types of electronic infections include Denial-of-Service, which includes the actual shut-down of many another(prenominal) legitimate websites and denies access to its existing user base, rendering many users unable to access important information. another(prenominal) type of malicious attacks is Malworms or Trojan Horses these are viruses spread by email and instant messaging, sometimes unaware by the user.They may be downloaded simply by visiting the wrong websites. Botnets or Zombies use several computers to launch the attack and slip ones mind information across a spread of terminals, copying the satanic computer software package from one device to the next. Social network attacks are also on the rise and sometimes a link may be posted to steal personal information or download a virus hidden by the attacker. Users inherent trust in menu vital information for their friends is what causes these social net whole kit to be prime targets for the attackers (Internet security, 2012).To day, 70% of large companies rank viruses and hacking ahead of parody and physical break-ins as their greatest threat. The importance of protecting vital electronic data is more important today than it has ever been. Whether it is the stealing of information, the planting of malicious malware or simply the intention to search and extirpate, hackers have become the nations number one threat in creating immense damage to businesses of all sizes and enkindle severely impact a companys integrity or capacitance to perform at its peak potential. IT security has now been placed very high on the guess management agenda of any major corporation (Why cyber security, 2010).There are several examples of attacks on computers to obtain secret information. One of many examples involves a 20 year old kid, by the diagnose of Christopher Maxwell who created a 50,000 computer zombie network that caused approximately $135,000 in damage by infecting a Seattle hospital and various military location s. The attack shut down not only the finance departments, except also attacked computers in the hospitals intensive care unit, seriously compromising many patients eudaemonia (OBrien, 2007).With the high demands of IT versatility, companies are more and more in need of more flexible hardware and software to cater to the ever growing demands of data transfer and information storage capabilities. The technology is becoming more bring upd and creates endless opportunities for todays businesses however this also creates more opportunity for cyber criminals to launch attacks and become more proficient in succeeding with new gateways to cause great harm or steal semiprecious data.A new new-made trend in stealing data is when traveling employees use these so called hot-spots to obtain internet access. Clever hijackers have found ways to throw up sprinkle pages. These splash pages track user data, credit card details used to pay for the wireless good and other information that may be used to harm the employee and/or the company the person works for. This also applies to home networks. Usually, individualistics do not invest into the same type of security that companies may do, making these home networks viable for attacks. This is very crucial, because the home computer can become infected with vicious malware and introduced into the study or vital information can be stolen that is confidential to the company (Why cyber security, 2010).It is now known that the Secret service maintains its own Electronic Crimes Task Force (ECTFs), which focus on identifying and locating cyber criminals entangled in all types of criminal activity such as entrust fraud, sensitive data breaches and other cyber related issues. The DHS (Department ofHomeland Security) prevented the potential losses of nearly $1.5 Billion through cyber crime and brought charges against 72 individual cyber criminals for their direct or indirect participation of wide-spreading the use of children por nography (Combat cyber crime,n.d.).In most recent news, President Obama is considering issuing an decision maker order that would require the DHS to prepare a set of guidelines and rules in the assault against cyber criminal activity. In April of 2012 (this year) the Cyber Intelligence Sharing and Protection Act (CISPA) was introduced into the House of Representatives, but failed to pass the Senate due to privacy issues, shows how serious Americans are on creating a plan of attack. Even though CISPA was not passed, the executive order that would be issued would not surpass the privacy issues that were the solid ground for CISPA not passing the Senates approval.The reason the CISPA bill did not pass is that several privacy advocacy groups oppsed the bill strongly because it would have allowed private companies to sell or exchange user data with the federal government for critical cyber security information (Koebler, 2012). Cyber security is the processes and practices designed to protect programs, networks and computers (and other devices) from malicious attacks and unsupervised access. It represents the body of technologies to understand and fight affirm in the event of unlawful damage and unnecessary harm (cybersecurity, 2010).The conclusion is to do our best to accent and prevent as much cyber criminal activity as possible. There a few things that companies and individuals can do. Stop. Think. Connect. These basic rules and guidelines have been measured by the industry and several help factors have been evaluated. The first of many basic rules is to keep your firewall and security software (ani-virus programs) up-to-date. Computer viruses and hackers are like any other general flu virus, they evolve and become stronger with each step in their evolutionary path. Constantly changing your passwords on your devices/software is also recommended.On average (at a minimum) these passwords should be changed at least once every three months. The second recommen dation is to shop online with the utmost care. Make sure you are on a HTTPS (Hypertext Transfer Protocol Secure) website when submitting personal information such as credit card numbers and bank account records or transactions. Another is laptop security. If a laptop is stolen, make sure you have the straightlaced software installed. There is tracking software available to pinpoint where you laptop is and there is also software available that can remotely access your computers files, erase them on the stolen device, and then place them in a secure data center for recovery.Another important tip is to avoid spam and scams. Questions every email of which the origin you do not know or trust, because simply by spring the wrong email can one access a virus or other harmful software. Social networking has become huge and it is also a great tool to obtain and research valuable information. It is highly recommended that not all data be put out there for one to see. This information is some times easily accessible to the wrong individuals. Also, dont just open any attachments or click on any suspicious links. Download with caution, because the Internet has a lot of harmful software out there that can cause serious damage to either your hardware or data files (and software).Referencescybersecurity. (2010, December). Retrieved from http//whatis.techtarget.com/definition/cybersecurity Combat cyber crime. (n.d.). Retrieved from http//www.dhs.gov/combat-cyber-crimeInternet security. (2012). Retrieved from http//www.internetsociety.org/what-we-do/issues/security?gclid=CNydtKjAr7ICFYSo4AodvnIA0gKoebler, J. (2012, September 11). Obama may use executive order to advance cybersecurity policies. Retrieved from http//www.usnews.com/news/articles/2012/09/11/obama-may-use-executive-order-to-advance-cybersecurity-policiesLeiner, B., Cerf, V., Kahn, R., Clark, D. (1962-1974). Brief history of the internet. Retrieved from http//www.internetsociety.org/internet/internet-51/history-inte rnet/brief-history-internet OBrien, R. (2007, January 22). Cyber crimes impact on

No comments:

Post a Comment