Sign In
Not register? Register Now!
You are here: HomeEssayIT & Computer Science
Pages:
4 pages/≈1100 words
Sources:
7 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 24.3
Topic:

Analyze the Challenges of Managing Human Aspect of Cyber Security (Essay Sample)

Instructions:

JP mOrGAN CYBER ATTACK HISTORY AND THE EFFECTS ON THE COMPANY

source..
Content:

Cyber Security
Name
Institution
Abstract
Cyber security is the protection of computers, programs, and networks from unauthorized persons. The J.P. Morgan’s mission is to increase the spending on cyber security so as to avoid future attacks. The insider threats to cyber security include human error, malicious employees and negligence among others within an organization. Most of the threat actors to cyber security are always under the influence of forces such as poverty, religion, culture, and tradition among others. There are security Acts and laws passed to protect organizations from such attacks, and any individual found guilty must face the law. Organizations must maintain privacy policies so as to reduce the vulnerability and to prevent future attacks by the hackers.
Cyber Security
Cyber security or information technology security refers to the protection of computers, programs, networks and data from unaccredited entry, alteration or destruction. Today’s society requires a degree of connectivity between business organizations, citizens, and governments that cross both cultural and political boundaries. Technology has given people the opportunity to share information, interact and learn from each other. Criminal activities such as vandalism, impersonation, and theft of classified organization’s information have been on the rise as technology upgrades.
J.P. Morgan Company’s mission is to increase its spending on cyber security so as to accelerate its original timeline as pertains to the growth of expenditure. The Company expects to double its spending on such matters for the next five years since its hit by the worst data breach. The company’s data got hacked by two individuals who are believed to have stolen the login details of one of the organization’s employees. The attack compromised the bank accounts of millions of households and small businesses and had made the bank not to progress at the rate it was in before the incident (Jessica, Matthew, and Nicole, 2014).
Human threats to cyber security
Human error is one of the leading threats to cyber security. Many external attacks are usually successful due to the negligence and weakness of the insiders within the organization who expose sensitive information unknowingly. There are three types of insider security threats that always occur within the company (Steve, 2016).
Accidental human error
People do make mistakes sometimes by sending sensitive data to unintended recipients unknowingly. The information by bad luck ends up landing to the hackers who sees that as their greatest opportunity to steal and destroy such data for their malicious gains. The case of J.P. Morgan could have been due to such a reason. It might be that the two criminals received the information from those working within the organization without their expectations thus taking advantage of hacking the system.
Malicious workers
Business groups always tend to have faith in their employees to the extent of providing them with useful information that regards the company. Such individuals usually take advantage of the trust the organization offers them to interfere with the data. They can either do it by themselves or give out their login credentials to outsiders to carry out the operation (Virtru, 2016). Looking at the case of J.P. Morgan Chase Bank, the two culprits most likely collided with one of the employees in stealing the data. The worker might have given out the login details used in leaking out the company’s records.
Negligence
Many organizations usually try to dodge from policies they think retards their work. They are always aware of the security risk factors associated with such behavior, but still, they don’t care to shun away from such activities.
Human interest factor
The human interest factor is exploited by attackers and plays a great role in today’s successful cyber attacks. These attacks entail social engineering methods to attract targeted users into committing mistakes. They mostly send emails with malicious attachments that cause malware download on the users’ computers. Through that, the attackers can get access to the organization’s vital records and bring harm to such data. Others also develop websites that when one logs into, they can manage to see and have access to every information in the computing device (Fran, 2014).
Threat actors to cyber security are always driven by external forces to carry out these attacks. These can be due to effects of culture, poverty, tradition and even religion.
Culture
Culture can influence choices and behavior in individuals when it comes to Computer Networks Attack. It is true that understanding these attack behaviors within cultural structures gives the defenders the aptness to personalize defenses. The Chinese military is not all that secretive in their attacks which befit high power distance and are also in the game for long-term through persistence. Russians also have a high long-term orientation in their cyber attacks. They mostly target the hardware’s supply chain and the routes owners of the stored information (AMERICAN NEWS, 2014).
Poverty
Poverty has compelled many individuals to carry out cyber attacks on organizations like Banks so as to financial accessibility. The good example is Nigeria where people are learned and are having Degrees and Doctorates in information technology. Due to lack of job opportunities, they usually end up applying the acquired knowledge in stealing from institutions (Imsu Business Journals, 2014).
Religion
Religion can also make individuals resort to cybercrime in their lives. The Al-Qaida terror group carries out their attack due to their religious background to be able to terrorize their enemies.
Ethical values
Some individuals try to compromise on the computer systems and then inform the information owner about the problem and are always available with the solution. They always get access to the software and websites to manage and to develop such challenges and solutions (CYBERCRIME, 2012).
Tradition
Many companies still rely on the traditional ways of protecting their data such as the old firewall. These approaches don’t work in today’s world thus encouraging cyber crime actors to try attacking the systems. Law enforcement is always lenient on the culprits thus encouraging the offence players to keep on carrying the attacks as they know the punishment is not all that strict.
The US Congress managed to pass a Cyber security Act of 2015 into law that aims to defend against such attacks by the creation of frameworks for the sharing of cyber threat information between private bodies and the government (ISACA, 2016). One of the liabilities related to cyber attack is the criminal law which just to prevent future attacks and to offer severe punishment to the offenders. The other on...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Describe Client Data Storage Methods in Javascript
    Description: Various APIs provide storage to clients. These include local and session storage, Web SQL Database, File Access and Indexed Database. ...
    4 pages/≈1100 words| 1 Source | APA | IT & Computer Science | Essay |
  • Social engineering
    Description: Social engineering IT & Computer Science Essay...
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Database Management: A Referential Integrity Constraint
    Description: Document provides an overview of the major components and terms usually in database management. It also acts as a partial fulfillment of the students coursework...
    1 page/≈275 words| No Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!