Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: July 1st, 2022

Security Threats

Computer Sciences and Information Technology
Security Threats
Read Top Ten Security Risks for 2019 (Links to an external site.) and research three security threats using credible sources (scholarly journals and articles). In a two- to three-page MS Word document, be sure to:
• Be sure to:

o Identify and describe the three security threats you selected.
o Describe how the threat manifests itself?
o What security mechanism would you use to mitigate each threat?

Security Threats
The nature of security threats in recent decades has shifted from being entirely physical to online threats. The increased use of the internet coupled with the high rates of its advancement has given birth to both positives and negatives. The recent study Cisco showed that cybersecurity is what organizations should watch out for which creates the need to increase protection and prevention measures.
Among the top 10 security risks identified were hacking, insider threats and the Internet of Things (Kingori, 2019). Hacking is the attempt to illegally get into a computer system or private networks without the knowledge or authorization of the owner. The main aim of the hackers is to break into the systems to alter or steal the information. There is a financial gain attached to hacking into the systems which act as the motivation behind the criminal activity by the hackers. For example, breaking into the banking systems and stealing credit card information or altering the banking systems can allow a hacker to transfer money without the knowledge of the bank.
Internet of Things (IoT) is among the newest technologies that enable communication between computing devices and systems (Jie et al., 2013). It is possible to transfer data across networks without the need for human-to-human interactions. Today, many homes in affluent communities make use of smart home technology which is only made possible by the IoT. The technology allows the communication between the electricity systems and the owner’s mobile device such that by the click of a button on the mobile phone, a homeowner can switch off the lights at home even when miles away. Insider threats refer to malicious attacks on the computer systems of an organization by people within it. It could be the current or former staff or associates with inside information about the systems and security practices of the organization.
Hacking involves an unknown person behind a computer who gets into the systems of the target and retrieved information that is then used to alter or to manipulate the target. The hacker may choose to blackmail the target and request for a ransom when they get hold of very sensitive information. An IP address could be all the hacker needs or an obvious password for them to get into the systems. IoT involved the storage of a lot of personal information into the systems. A hacker gets into the systems and retrieves data such as the current location of a homeowner and then plans on a home break when the owner is away. Insider threats are very common when a mole gives out organizational passwords of the rivals who then hack into the systems causing damage which will slow down the growth (Dalal, & Gorab, 2016). The rival company then gets an opportunity to grow and pass the target company which happens mostly with business empires.
Cybersecurity threats have a major common cure that works across all the existing threats. Training employees on the safe use of the internet and the computer systems should be the top priority measure which will work as a preventive action (Gunkel, 2018). The other most important action that companies should take is adhering to the cybersecurity both the national and organizational cybersecurity standards. For example, using a two or three-step authentication process and not sharing passwords should be strictly used and sanctions put in place for any employee that breaks the rules. Lastly, it is important to invest in computer systems that can detect and warn of an incoming threat which with the help of the well-trained staff will save the company from the damage of the attack.
It does not matter whether a company or an individual has faced a cyber-threat before or not, the reality is at one point, they will be open to the dangers. It is necessary to put heavy preventive measures to avoid the damage that could be caused by a cyberattack.

References
Dalal, R. S., & Gorab, A. K. (2016). Insider Threat in Cyber Security: What the Organizational Psychology Literature on Counterproductive Work Behavior Can and Cannot (Yet) Tell Us. In Psychosocial Dynamics of Cyber Security (pp. 122-140). Routledge.
Gunkel, D. J. (2018). Hacking cyberspace. Routledge.
Jie, Y., Pei, J. Y., Jun, L., Yun, G., & Wei, X. (2013, June). Smart home system based on IoT technologies. In 2013 International Conference on Computational and Information Sciences (pp. 1789-1791). IEEE.
Kingori, D. (2019, January 17). Top 10 Cybersecurity Risks for 2019. Retrieved from https://www.uscybersecurity.net/risks-2019/

Order | Check Discount

Tags: 150-200 words discussion with a scholarly reference, 200-300 words response to classmate discussion question, 250 word analysis essay, bachelor of nursing assignments, case study, essay bishops website

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00