Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
1 page/≈275 words
Sources:
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:

Cyber Security (Essay Sample)

Instructions:

A look into cyber security.

source..
Content:

Statement of research
Literature Review on Cyber Security
_________
WRTG391
Professor Patricia L. Hunt
2/10/2014
Cyber security refer to the standards that an organisation applies in a bid to ensure that the data and information stored on their computers is not accessed by an authorized persons either remotely or through the internet. Cyber security is a very vital part of any organisation. This is because a leak of any information that is privy to particular members of the organisation can cripple or worse lead the organisation to closure.
The internet has played a major role in the vulnerability of organisations soft information stored in computers. This is because once a computer is connected to the internet, the risk of an information leak increases Hackers will automatically gain access to any system that is not secured appropriately, thereby accessing all the data on the computer. In avoiding this eventuality organisations employ the use cyber security standards. However, this action only minimises the risk and does not deal with it to totality. It is indeed impossible to have a full proof security system. While we cannot live without the internet, it is important to have software’s designed to curb any threats posed by internet connectivity.
In writing the literature review the scholar has not clearly defined cyber security and what it involves : ‘indeed Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
ISO 27001 (ISO27001) is the international Cyber security Standard that provides a model for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving an Information Security Management System. Failure to clearly identify the scope of study with an accurate definition will often result to ambiguity since the research topic will be too broad. The scholar should therefore strive to have a clear cut path on which he/ she follows in a bid to achieve the desired result.’
The use of cyber space need not be over emphasised. The scholar needs to clearly explain what cyber space entails and how it works; these should include its impact on ensuring cyber security.
The scholar should go into more detail and study the laws that govern cyber crimes in the United States. It is important for the scholar to understand how the law defines cyber crimes. and the pre requisite requirements needed for any offender to be condemned to having committed a cyber crime. These laws include Computer Fraud and Abuse Act (CFAA), and subsequent amendments by the Identity Theft Enforcement and Restitution Act and the USA Patriot Act.
On the recommendations the writer should examine the possibility of having international legislation governing cyber crimes. This is because a cyber crime may be committed by absolute strangers from different continents. Harmonisation of these laws will lead t...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Custom Essay Written?
First time 15% Discount!