Essay on Cyber Security

159 views 2 pages ~ 472 words
Get a Custom Essay Writer Just For You!

Experts in this subject field are ready to write an original essay following your instructions to the dot!

Hire a Writer

Cybersecurity and the Cyber Environment

Cybersecurity is considered as a set of tools, strategies and approaches to risk management that can be used to protect the cyber environment, organization and user resources (Manjon). It consists of certain actions for achieve and maintain the security properties of an organization's or a user's resources against the corresponding security threats in the cyberspace. The confrontation in cyberspace is a fundamentally new sphere of confrontation between states. The rapidly growing interest in the world in the field of cyberspace is largely due to the activity of various countries in cyber war and cyber security issues. For this reason, the issue of cyberthreat and cybersecurity in the modern world should be brought up, since it

Cyberspace and the United States

The USA is the state that retains technological and military leadership, and there several directives and official documents regulating political and military activities in cyberspace were adopted at the highest level. Therefore, the US equates acts of cyberattacks with traditional military actions and provides for the possibility of responding to serious attacks with proportional and just military measures, up to the use of nuclear weapons. At the same time, the representatives of the Pentagon state that the developed doctrine is only the first step towards the development of cyberspace. Additionally, the US intelligence agencies work regularly on strengthening the cyber defense of the state. Nevertheless, certain events have led to the idea that there are certain groups of people who are in the country they intend to attack for a long time and collect information on how to hack important files or money from accounts.

Hacker Attacks on Financial Institutions

For example, in 2011 Citigroup Inc, a banking group, reported 360,000 casualties because of a hacker attack on a database in the United States. The hackers broke into the computer network RSA, having access to information about the technology SecurID, which is used to ensure the security of corporate computer networks. Subsequently, a list of companies whose computer networks were probably compromised using the same resources as when attacking the RSA network was published. Obviously, this was done via the Internet, and hackers managed to access the personal data of account holders (Ramsbotham et al, 426). It can be concluded that cyberattack is a planned action against a company or companies with the aim of frightening, disarming or stealing data of varying importance and then using them. Undoubtedly, it implies work of many spies, hackers and "actors" who communicate with others to achieve their goals. It lasts for a long, but cyber hackers every year are harder to calculate.

Works Cited

Manjon, Marcelo. A Framework to Help Make Sense of Cybersecurity Tools. Network World, June 4, 2015. Accessed on 28 March 2018 from networkworld.com/article/2931576/security0/a-framework-to-help-make-sense-of-cybersecurity-tools.html.

Ramsbotham, O., Woodhouse, T., Miall, H. Contemporary Conflict Resolution. Polity Press, Third Edition, 2011. MA, USA.

August 01, 2023
Number of pages

2

Number of words

472

Downloads:

34

Writer #

Rate:

4.7

Verified writer

Richard is the best writer for Data Science tasks, even if you have something really complex. I needed to do tasks on security matters and already had a draft. Sharing my ideas with Richard ended up in a perfect paper!

Hire Writer

This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Eliminate the stress of Research and Writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro