This website uses cookies to ensure you have the best experience. Learn more

Cyber Security Essay

534 words - 3 pages

Define Cyber Security.

Computer security is also known as cyber security or IT security which refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. It is an information security as applied to computers and computer networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters.

Most computer security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or ...view middle of the document...

 Chain of trust techniques can be used to attempt to ensure that all software loaded has been certified as authentic by the system's designers.
 Cryptographic techniques can be used to defend data in transit between systems, reducing the probability that data exchanged between systems can be intercepted or modified.
 Firewalls can provide some protection from online intrusion.
 A microkernel is a carefully crafted, deliberately small corpus of software that underlies the operating system per se and is used solely to provide very low-level, very precisely defined primitives upon which an operating system can be developed. A simple example with considerable didactic value is the early '90s GEMSOS (Gemini Computers), which provided extremely low-level primitives, such as "segment" management, atop which an operating system could be built. The theory (in the case of "segments") was that—rather than have the operating system itself worry about mandatory access separation by means of military-style labelling—it is safer if a low-level, independently scrutinized module can be charged solely with the management of individually labelled segments, be they memory "segments" or file system "segments" or executable text "segments." If software below the visibility of the operating system is (as in this case) charged with labelling, there is no theoretically viable means for a clever hacker to subvert the labelling scheme, since the operating system per se does not provide mechanisms for interfering with labelling: the operating system is, essentially, a client (an "application," arguably) atop the microkernel and, as such, subject to its restrictions.
 Endpoint security software helps networks to prevent data theft and virus infection through portable storage devices, such as USB drives.
 Confidentiality is the nondisclosure of information except to another authorized person.
 Data integrity is the accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record.

Other Papers Like Cyber Security

Cyber Warfare Essay

596 words - 3 pages warfare, one of which was provided earlier this year by Defence Signals Directorate's (DSD) Deputy Director of Cyber and Information Security Mike Burgess in a speech to the Old Crows Association. He defined cyber warfare as 'an act...intended to degrade, destroy or deny computer accesses and systems' and added 'a true act of cyber warfare would have to be potentially lethal, instrumental and political'. Information stored on computers has

Week 3 Paper

902 words - 4 pages Attack Prevention: Preventing Cyber Attacks Krista McCafferty CMGT441: Introduction to Information Systems Security April 20, 2012 Attack Prevention: Preventing Cyber Attacks In today’s society technology is everywhere. The use of computers, cell phones, GPS’s, and internet are a lot more common. Now that today’s technology is

Security for Web Applications

1022 words - 5 pages RECENT CYBER ATTACKS SANDEEP VEMULAPALLI 12917417 IA-606 ST.CLOUD STATE UNIVERSITY SEP4, 2015 Cyber Attack: The attempt of breaching the security layers of an organization or a system by disrupting the network and there by accessing, stealing, modifying or destroying the valuable data and using the data for fraudulent purposes, causing a loss to the organization is called a Cyber Attack Origin: The idea of cyber attacks began at the

Cyber Crime Team

1543 words - 7 pages these crimes. Combating Corrections Issues Allowing inmates to use a computer and the Internet creates a security problem. Computer knowledgeable inmates could breach the security to access correctional system files or use the computer and Internet for other illegal purposes. Inmates may require computer restrictions to eliminate the possibilities of cyber-crimes within correctional facilities. A monitoring program that tracks website access

Cyber Threats

658 words - 3 pages your security to help protect against future attacks. There are thousands of ways to help protect against cyber terrorism threats but I think the following are the simplest and most effective ways to start, Make sure all accounts have passwords and the passwords should be unusual, difficult to guess. Be sure to change the network configuration when defects become known. Constantly check with venders for upgrades and patches that can be installed

Cyber Terrorism: The American Response

1741 words - 7 pages Cyber Terrorism: The American Response Mutale Chisanga School of Computer Science 03-60-305 Professor Kristina Verner March 6, 2016 Cyber terrorism: The American Response United States (U.S.) critical infrastructure faces a growing cyber terrorism threats due to advancements in the availability and sophistication of malicious software tools and the fact that new technologies raise new security issues that cannot always be addressed

Th Importance of Deleting Cyber-Bullying

723 words - 3 pages can track down who is committing the act. If you or someone you know has been or is currently the victim of Cyber-bullying, you should contact the National Cyber Alert System, which is sponsored by the United States Department of Homeland Security, they can be contacted at (888) 282-0870. Individuals are also encouraged to contact the National Crime Prevention Council at (202) 466-6272. Remember that Cyber-bullying is a crime. No one deserves

Cyber Crimes

548 words - 3 pages CYBER CRIMES Cybercrime has been one of the cases that rise nowadays. Some of us may do not know what cybercrime is. Cybercrime is activity with criminal motive and with intention to harm others or stealing something (such as personal information, money, etc.) that using computer or network as its media. The scope of cybercrime could be very narrow, such as stealing examination questions from school’s bank data. It also could be on a very big

Cyber Attack Prevention

737 words - 3 pages cyber-criminals of today. Material Quality The quality of the material is credible. The article is valid. The author uses more than one in-text citation, and provides references following the article. The material within the article is information and is appropriate to subjects that are the topic of discussion in current information systems security courses. Aspects of the Article The article focuses on informing individuals about cyber

Cyber Ethics

2247 words - 9 pages Acceptable Use policy, Internet Use policy, Security policy, and acceptable conduct policy for its employees that is supposed to be required reading. Like with any law, in cyber security there are always law-breakers waiting for the chance to exploit a weak firewall, a patch in the system, or a careless employee who leaves login information open for the wrong eyes to see. For this reason government and private sector alike must constantly

Cyber Crime

3407 words - 14 pages ...................................................................................................................... 2 3.1. Cyber Crime ................................................................................................................................. 2 3.2. Cyber security ............................................................................................................................... 3 4. Key Findings / Discussion of your research topic ............................................................................ 3

Related Essays

Cyber Security: Cyber Terrorism Essay

1810 words - 8 pages Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity

Cyber Security Essay

1448 words - 6 pages some risk present. Risk will be like lost of data or to protect data by any attack of security. According to a survey which took place in 2012 about security, the graph of crimes and security attacks is gradually going up every year. As we talk about security it’s a very huge field to do research on it. Security has many different units in a field. One can’t do a research on this topic. The topic I am going to discuss in my research is cyber

Cyber Security: Physical And Digital Security Measures

3505 words - 15 pages Cyber Security: Physical and Digital Security Measures Abstract Due to the issues associated with cyber security and the appropriate application thereof, this paper will strive to address different cybersecurity measures that may be employed, both physically and digitally. It will identify what cyber security is, measures that may be taken, the tools needed to ensure implementation, and provide information regarding the different resources

Cyber Security And Its Challenges To Society

3707 words - 15 pages ------------------------------------------------- Cyber security and its challenges to society Final Project Report Group Members Abdul Majid Qayyum Umair Arshad Hasnat Ahmed Gulraiz Shabbir Contents Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is