Wednesday, May 6, 2020

Cyber Security And The Internet Security Essay Example For Students

Cyber Security And The Internet Security Essay Businesses and people are using Internet for entertainment, e-business and e-commerce, social networking, and communication to the people and business, but there have always been threats to the Internet Security. Internet security is major concern in field of technology, because there are various personal, business and government data on the Internet. Today every businesses and organizations have their own security systems to reach their goals of information security. Internet security systems are created to reduce cyber attack risks, reliability, maintain confidentiality, and compliance with privacy laws and national security laws. However security standard that has been made, and laws brought by government are not more enough to protect Internet Security, so more advanced security and more strict law by government should be brought in action to protect Internet Security. There are different kinds of security standards when integrating security approach in new systems. Some government agencies and organizations adopt well-established standards, while some companies make their own private security systems. Storing data Offsite has been beneficial for business to store data on cloud due to storage insufficiency. Devanney, the author of â€Å"Offsite Information Storage: Cloud Computing And Cyber Security Issue† explains that The Department of Justice divides cybercrime into three categories: the computer as target, weapon, and as an accessory (p3). Lost Internet connection can heavily affect those organizations, which use PSA system with the cloud. Devanney also claims that current PSA packages are beginning to partner with ERP in order to create more accessible software. US Department of homeland security has conducted a campaign â€Å" The. .n.ReferencesBailey, T., Kaplan, J. M. , Rezek, C. (2015). Repelling thecyberattackers. Mckinsey Quarterly, (3), 54-63.Department of Homeland Security. Stop. Think. Connect. (2010) Retrieved from https://www.dhs.gov/about-stopthinkconnectDevanney, P., Quilliam, W. , DuVal, C. W., Santos, N. .(2016). Offsite Information Storage: Cloud Computing and Cyber Security Issues. Annual International Conference On Accounting Finance, 75-78. doi:10.5176/2251-1997_AF16.37Szoldra, P. (2015). The 9 worst cyber attacks of 2015 Retrievedfrom http://www. techinsider.io/cyberattacks-2015-12 The White House, Office of the Press Secretary (2015, January13). Announcement by the President on SECURING CYBERSPACE. Retrieved from https://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislat

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.