IntroductionPaper.docx

CYBERSECURITY INTRODUCTION PAPER 2

CYBERSECURITY INTRODUCTION PAPER 2

Introduction Paper

Cybersecurity Introduction Paper

Technological development has continued to be at heart and the driving point of the industrial revolution in the world. Technology refers to the process of using scientific principles and procedures in the production process. People rely on technology now more than ever, given the convenience, speed, and security it offers to individuals. Computers and the internet are the driving force that has continued to offer the base for groundbreaking inventions and development. Computers and the internet have continued to dominate the world’s mechanical, communication, health and medicine, business, social, and real estate industries. Technology has revolutionized the telecommunication industry and offered people convenience, speed, and cost-effective means of communication. However, the development in technology has been marred with series of challenges such as data theft, loss of privacy, and financial losses. To offer security and confidentiality for individual data, scientists develop new and varied technology to improve security and deter criminal individuals from unauthorized entry to information technology systems. Such technologies form the basis of the cybersecurity aspect of technology. Cybersecurity represents the aspect of protecting computer systems from unauthorized access that could lead to damage, data loss, or denial of access.
Cybersecurity experts continue to develop prevention techniques against various cybersecurity threats that continue to face information technology systems. Some of the cyber threats that have continued to cause havoc to information technology systems include malware, which represents malicious software such as viruses, spyware, worms, and ransomware that activates and installs on a computer system when a user clicks on insecure links or attachments. Malware leads to spillage of personal data, leads to denial of access to one’s computer systems, and can damage computer systems. Denial of service is another cybersecurity threat that acts by flooding a computer system or network system so that the system does not respond to commands. Lastly, the SQL injection or the Structured Query Language injection represents a cybersecurity threat from the injection of malicious codes into servers that use SQL systems, leading to loss of information.
Experts in the field of cybersecurity continue to put more emphasis on two particular aspects considered to be the weak links in cybersecurity protection. To begin with, the Internet of Things technology has evolved to the point that almost every device within our homes can have access to the internet and either sent or receive information over the internet. Experts are increasingly concerned that these technologies do not meet the technical security capabilities to prevent hackers from accessing other information systems using the device. Secondly, data explosion; storage of data and information on individual computers and mobile phones make it easier for individuals to access a network using these devices.
Organizations need to enforce strict password rules to improve cybersecurity and prevent an organization from losing data and other economic losses arising from cyber-attacks. Passwords act as the first line of defense. Secondly, an organization needs to update its operating systems, browsers constantly, and other essential software. Lastly, organizations also need to implement and use Virtual Private Networks, which are more secure than regular networks.

References
Lezzi, M., Lazoi, M., & Corallo, A. (2018). Cybersecurity for Industry 4.0 in the current literature: A reference framework. Computers in Industry, 103, 97-110. Retrieved from

https://www.sciencedirect.com/science/article/abs/pii/S0166361518303658

England, S. K. (2020). Internet of Things Device Cybersecurity and National Security (Doctoral dissertation, Utica College). Retrieved from https://search.proquest.com/openview/5d7b256576c5ad12d394c8719f1f3c15/1?pq-origsite=gscholar&cbl=18750&diss=y

Sayler, K. M. (2019). Artificial intelligence and national security. Congressional research service report R45178. Retrieved from https://www.everycrsreport.com/files/20191121_R45178_ddbcce24a6fbf02ad9e81387b5623295ac60f017.pdf

Sanchez, S., Mazzolin, R., Kechaoglou, I., Wiemer, D., Mees, W., & Schrogl, K. U. (2020). Cybersecurity space operation center: Countering cyber threats in the space domain. In Handbook Space Security (pp. 921-939). Springer. Retrieved from https://link.springer.com/content/pdf/10.1007/978-3-030-23210-8.pdf#page=922

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code HAPPY