ARGUMENTATIVE PAPER.doc - ARGUMENTATIVE PAPERS Thus...

This preview shows 1 out of 3 pages.

ARGUMENTATIVE PAPERS Thus Cybersecurity really makes us safe from threats? Or it will only lead us to danger. What is the importance of Cybersecurity and Cyber threats on a human being. Hundreds of millions of computers are connected to the Internet, and many computer systems are Without adequate protection in place to prevent illegal access.Analysis carried out by the University of Maryland suggests that an unprotected computer system that is connected to the Internet is likely to Experience attack within less than a minute. The installation of protective measures can lower the risk,but successful attacks against well-protected computer systems prove that technical protection measures can never completely stop attacks. Recently, software tools are being used to automate attacks. With the help of software and preinstalled attacks, a single offender can attack thousands of computer systems in a single day using one computer. If the offender has access to more computers, through a botnet he can increase the scale still further. Since most of these software tools use preset methods of attacks, not all attacks prove successful. Users that update their operating systems and software applications on a regular basis reduce their risk of falling victim to these broad-based attacks, as the companies developing protection software analyse attack tools and prepare for the standardized hacking attacks. High-profile attacks are often based on individually-designed attacks. Offenders can intercept communications between users(such as e-mails) or other forms of data transfers (when users upload data onto webservers or access web-based external storage media) in order to record the information exchanged. In this context, offenders can in general target any communication infrastructure (e.g. fixed lines or wireless) and any Internet service (e.g. e-mail, chat or VoIP communications). Sensitive information is often stored in computer systems. If the computer system is connected to the Internet, offenders can try to access this information via the Internet from almost any place in the world. The Internet is increasingly used to obtain trade secrets. The value of sensitive information and the ability to access it remotely makes data espionage highly interesting. Cybersecurity plays an important role in the ongoing development ofinformation technology, as well as Internet services. Making the Internet safer (and protecting Internetusers) has become integral to the development of new services as well as governmental policy. Cybersecurity strategies – for example, the development of technical protection systems or the education of users to prevent them from becoming victims of cybercrime – can help to reduce the risk of cybercrime. An anti-cybercrime strategy should be an integral element of a cybersecurity
Image of page 1

Subscribe to view the full document.

strategy. The ITU Global Cybersecurity Agenda, as a global framework for dialogue and international cooperation to coordinatethe international response to the growing challenges to
Image of page 2
Image of page 3
You've reached the end of this preview.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern