Essay Available:
You are here: Home → Essay → Technology
Pages:
2 pages/≈1100 words
Sources:
6 Sources
Level:
MLA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:
How a Cyber Warrior Can Use a Social Networking Site to Obtain Information (Essay Sample)
Instructions:
THE TASK WAS ALL ABOUT CYBER WARRIORS AND THEIR SECURITY OPERATIONS IN CYBERSPACE TO SECURE GROUND FOR SECURITY.THIS ESSAY EXPLAINS HOW THE CYBER WARRIORS NAVIGATE THE INTERNET PLATFORMS TO IDENTIFY AND CURB SECURITY THREATS.IT IS A WELL-WRITTEN ESSAY IN ALIGNMENT WITH THE MLA WRITING STYLE.
source..Content:
Author:
The institution of Affiliation:
Professor:
Date:
Cyber Warriors and Cyber Security
As technological advancements occur every single day, the involvement of personalities into the cyberspace is becoming more and more inherent. This owes to the fact that virtually everything from the social, political to the economic sphere operate efficiently because of advancement technological systems. For this very particular reason, the realization of creating awareness to as many people as possible in matters technology is ideal since it will hugely contribute to the worlds’ progress.
According to PW Singer(1), even other professionals operating out of the confines of cyberspace should strive to keep pulses with the principles and foundational concepts so they do not get cast off the cyber divide by falling prey to cyber criminals in existence. This is aimed at preventing potential attacks to the cyber arena. The Cyber Warriors therefore handily come into the picture.
A cyber warrior is an individual depth expertise in the sabotage or infiltration of information systems. Usually, they monitor the information systems in order to protect them from outside attacks in order to fulfill military and strategic purposes. In addition to that, As per Dowd &Schuh (26), Auditing is an essentiality since information systems are vulnerable to interference and attack. Cyber Warriors are therefore needed in this area.
How a Cyber Warrior Can Use a Social Networking Site to Obtain Information
Following Jeremy(1), b the social media is certainly a pivotal networking site for the cyber warriors as it paves way for the dissemination of plenty of information worldwide. In fact, even the corporate world has readily embraced advanced technological sites as a vital tool for the dissemination of information about the employees as well as keeping abreast with the work progress. Social-networking sites like Facebook, LinkedIn, and Instagram have are therefore the breeding grounds for cyber warriors. Even the cyber warriors with nefarious motives can be manipulated the systems for their goals.
Additionally, according to Dowd & Schuh (30) vulnerabilities of software applications including design vulnerabilities, implementation vulnerabilities, and operational vulnerabilities are targeted by the cyber warriors so they can easily obtain information. A cyber warrior can, therefore, take advantage of the vulnerabilities in order to successfully intrude the Information systems.
As per Saadawi, Jordan& Boudreau (53) the cyber warriors can have access to the information systems through the firewalls after hacking so they can have their way and manipulate or obtain information ultimately. In the internet circles and particularly the social media platforms lot of information is uploaded by the users, some of this information can be very helpful to a cyber-warrior since he or she can just take the plunge into the systems in order to access a lot of information by just the click of a button. The users should be forewarned not to furnish the platforms with a lot of sensitive information regarding their residence or wealth since the sensitive information may attract cyber warriors with criminal motives and end up as victims.
Following Richard (1) cyber insecurity is a huge threat to National security and therefore more people should be sensitive in what happens in the cyber realm so that they take precautions on the insecurity to evade the disastrous aftermath underneath. In addition to that, according to Saadawi, Jordan& Boudreau (88), the relevant authority should also blend in with the technicalities as well as military power in order to effectively handle the war on cybercrime.
The Criteria on How a Cyber Warrior Navigates and Maneuvers the Internet
A cyber warrior should make good use of their expertise while going about the information-searching endeavor to successfully obtain the information as required without fail. To begin with, the basis on which the cyber warriors operate relies heavily upon the vulnerability concept of the operating systems.
The vulnerabilities of software applications including implementation vulnerabilities, design vulnerabilities, and operational vulnerabilities give the cyber warriors the loopholes of intrusion so they have their way through. (Dowd & Schuh 26).These is therefore the main front on which the intrusion can likely take place as conducted by the cyber warriors.
Secondly, taking advantage of the vulnerabilities enables the cyber warriors to have access to the firewalls of the systems jetting right into hidden information. According to Dowd & Schuh (32), since vulnerabilities cannot be traced in the source code but depends on how it interacts with the environment, the cyber warriors use this conceptual basis to track down the information following the operation correlation with its nearby environment.
This may be referred to as hacking since it is not permissible and the owner of the sites or people beholding the intruded information are usually clueless that someone may access the information. In addition to that, the cyber warriors may also introduce malware or spyware in order to alter the normal functioning of systems so that they can manipulate the information or prevent the dissemination of the information further.
This is usually done with the aim of having access to the information. Also, the cyber warriors can also attain the information by tapping into the social media space. As per Jeremy (1) the social media platforms have tremendously grown over the years to become the main forms of communications in both the social and corporate world.
Since a lot of information is placed on the social media platforms, the cyber warriors can also name use of these networking sites by communicating with the individuals so they derive information. For instance, a cyber-warrior can befriend a suspect in one of the social media platforms order to glean important information touching on his or her person.
Answers to questions such as age, race, location and religious affiliations c...
The institution of Affiliation:
Professor:
Date:
Cyber Warriors and Cyber Security
As technological advancements occur every single day, the involvement of personalities into the cyberspace is becoming more and more inherent. This owes to the fact that virtually everything from the social, political to the economic sphere operate efficiently because of advancement technological systems. For this very particular reason, the realization of creating awareness to as many people as possible in matters technology is ideal since it will hugely contribute to the worlds’ progress.
According to PW Singer(1), even other professionals operating out of the confines of cyberspace should strive to keep pulses with the principles and foundational concepts so they do not get cast off the cyber divide by falling prey to cyber criminals in existence. This is aimed at preventing potential attacks to the cyber arena. The Cyber Warriors therefore handily come into the picture.
A cyber warrior is an individual depth expertise in the sabotage or infiltration of information systems. Usually, they monitor the information systems in order to protect them from outside attacks in order to fulfill military and strategic purposes. In addition to that, As per Dowd &Schuh (26), Auditing is an essentiality since information systems are vulnerable to interference and attack. Cyber Warriors are therefore needed in this area.
How a Cyber Warrior Can Use a Social Networking Site to Obtain Information
Following Jeremy(1), b the social media is certainly a pivotal networking site for the cyber warriors as it paves way for the dissemination of plenty of information worldwide. In fact, even the corporate world has readily embraced advanced technological sites as a vital tool for the dissemination of information about the employees as well as keeping abreast with the work progress. Social-networking sites like Facebook, LinkedIn, and Instagram have are therefore the breeding grounds for cyber warriors. Even the cyber warriors with nefarious motives can be manipulated the systems for their goals.
Additionally, according to Dowd & Schuh (30) vulnerabilities of software applications including design vulnerabilities, implementation vulnerabilities, and operational vulnerabilities are targeted by the cyber warriors so they can easily obtain information. A cyber warrior can, therefore, take advantage of the vulnerabilities in order to successfully intrude the Information systems.
As per Saadawi, Jordan& Boudreau (53) the cyber warriors can have access to the information systems through the firewalls after hacking so they can have their way and manipulate or obtain information ultimately. In the internet circles and particularly the social media platforms lot of information is uploaded by the users, some of this information can be very helpful to a cyber-warrior since he or she can just take the plunge into the systems in order to access a lot of information by just the click of a button. The users should be forewarned not to furnish the platforms with a lot of sensitive information regarding their residence or wealth since the sensitive information may attract cyber warriors with criminal motives and end up as victims.
Following Richard (1) cyber insecurity is a huge threat to National security and therefore more people should be sensitive in what happens in the cyber realm so that they take precautions on the insecurity to evade the disastrous aftermath underneath. In addition to that, according to Saadawi, Jordan& Boudreau (88), the relevant authority should also blend in with the technicalities as well as military power in order to effectively handle the war on cybercrime.
The Criteria on How a Cyber Warrior Navigates and Maneuvers the Internet
A cyber warrior should make good use of their expertise while going about the information-searching endeavor to successfully obtain the information as required without fail. To begin with, the basis on which the cyber warriors operate relies heavily upon the vulnerability concept of the operating systems.
The vulnerabilities of software applications including implementation vulnerabilities, design vulnerabilities, and operational vulnerabilities give the cyber warriors the loopholes of intrusion so they have their way through. (Dowd & Schuh 26).These is therefore the main front on which the intrusion can likely take place as conducted by the cyber warriors.
Secondly, taking advantage of the vulnerabilities enables the cyber warriors to have access to the firewalls of the systems jetting right into hidden information. According to Dowd & Schuh (32), since vulnerabilities cannot be traced in the source code but depends on how it interacts with the environment, the cyber warriors use this conceptual basis to track down the information following the operation correlation with its nearby environment.
This may be referred to as hacking since it is not permissible and the owner of the sites or people beholding the intruded information are usually clueless that someone may access the information. In addition to that, the cyber warriors may also introduce malware or spyware in order to alter the normal functioning of systems so that they can manipulate the information or prevent the dissemination of the information further.
This is usually done with the aim of having access to the information. Also, the cyber warriors can also attain the information by tapping into the social media space. As per Jeremy (1) the social media platforms have tremendously grown over the years to become the main forms of communications in both the social and corporate world.
Since a lot of information is placed on the social media platforms, the cyber warriors can also name use of these networking sites by communicating with the individuals so they derive information. For instance, a cyber-warrior can befriend a suspect in one of the social media platforms order to glean important information touching on his or her person.
Answers to questions such as age, race, location and religious affiliations c...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Protecting Our Freedom of Speech in a Flat, Digital WorldDescription: The essay body explains more on censorship and limitations to freedom of speech and relates it to the Canadian context on freedom to information censorship...2 pages/≈550 words| 5 Sources | MLA | Technology | Essay |
- Lithium Ion Batteries: The Birth and the Role in the New Technology’s Energy NeedsDescription: Video cameras, portable laptops, cell phones were being introduced into the market. Such devices required batteries that were both small and of very low weight...5 pages/≈1375 words| 6 Sources | MLA | Technology | Essay |
- Technology and Interpersonal Relationships Research Description: Apparently, the Internet is one of the major aspects of technology that have revolutionized global communication....5 pages/≈1375 words| 5 Sources | MLA | Technology | Essay |