Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare
Threats, Risks, and Vulnerabilities
In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating IT tools in their business model. A business faces a threat that involves a potential violation of security with intent to exploit a vulnerability and cause harm to the business market advantages. A vulnerability is the weak aspect of organizational IT asset, which can be exploited to cause a threat to an organization. On the other hand, an asset is any tangible or intangible materials that can add values to an organizational mission or a business operation.
A risk is a likelihood of being attacked. However, a threat is a source of a particular attack. Thus, an organization needs to carry out a threat assessment to determine an appropriate approach to secure information systems from a threat. A business needs to carry out a threat assessment to determine an appropriate approach to secure information systems. A penetration testing is an effective strategy to assess threat profiles in order to develop countermeasures against given threats.
Moreover, a business faces the risk of attack that involves a deliberate attempt to violate a system security. A risk security management is a strategy that organizations can employ to protect or prevent security threats on organization IT tools and infrastructures. Vacca, (2012) points out that threats are the incidents that can cause harm to organizational IT infrastructure and assets. Moreover, a vulnerability is the weakness of organizational IT infrastructure and assets, which can be exploited by an attacker. Vacca, (2012) points out that risk management involves integrating security measures to protect organizational IT infrastructures. Typically, an effective risk management is very critical to enhancing a successful IT security program.
Despite the benefits associated with the IT risk management policy, however, integrating security measures along integrating the operational framework is high challenging for organizations. The costs of implementing an appropriate security measures are sometimes enormous for some organizations. Sometimes, some organizations may face difficulties in justifying the costs with the benefits associated with the IT investments. Organizations may also face challenges in developing an effective and efficient IT security plan. Vacca, (2012) further argues that organizations require an effective IT security measure to protect the IT assets since IT treats can make organizations lose the values of its IT assets. Since 2008, different organizations have lost both sensitive information and funds worth billions of dollars. For example, Target Retail was a victim of cyber-attack where 40 million credit and debit card information of customers were stolen. Moreover, Home Depot was a victim of a cyber-attack where cyber criminals stole credit card information of 56 million shoppers in 2014.
Vacca, (2012) recommends that application of risk management is very critical to protect IT assets. The risk management involves assessing security controls as well as using appropriate security procedures to prevent and manage the security threats. Essential risk management includes risk assessment, risk evaluation, and risk mitigation. Risk management is the process of balancing operational and economic costs to achieve mission objectives. Moreover, Vacca (2012) points out that risk management involves six processes that include risk treatment, risk assessment, risk acceptance, risk consultation, risk monitoring and risk communication. However, the most important aspect of risk management is risk mitigation.
Topic 2: Zero-day Exploit
A zero-day exploit refers to a situation where an attacker takes an advantage of security vulnerability identified in the same day. In another word, a zero-day exploit is an attack carried out by a cybercriminal on the same day the software flaw is known before software developer has time to fix the vulnerability. Ordinarily, when a company detects that a software program contains a security flaw, the software alerting tool needs to notify a software developer to fix the program. However, sometimes an attacker may detect the loophole on the same day t before a developer is aware of the problem. Depending on the complication of the software security issue, it may still take some time before an attacker exploits the security issue. Thus, it very important for organizations...
Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack
Cyberterrorism on the U.S. Economy The Impact of Cyber Terrorism on the U.S. Economy In accordance to the Federal Bureau of Investigation (FBI), cyber terrorism can be defined as a calculated and politically enthused attack against data, information, computer systems and computer programs, which in turn, brings about non-physical vehemence against civilian targets. In simple words, cyber terrorism implies making use of the web to cause detriment to the real world
Cybercrime, Cybercriminals, And Cybercops Cybercrime Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such
Human Aspects in IT and Cybersecurity Outline Government Justification of Informing Private industry to improve or Set up Cyber-security Methods of the Government Interventions Impacts of Government Regulation on National Security Failure to comply to related cyber regulations Meeting the minimum requirements. Exceeding the Minimum Requirements The economic and national security of the United States rely on the effective functioning of the country critical infrastructures. Recently, the U.S. government has issued an executive order to manage the
His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now