Thursday, June 20, 2019
Cybersecurity Threats and the Future of the Internet Research Paper
Cybersecurity Threats and the Future of the meshing - Research Paper ExampleThis would make the medium of net profit and engineering more effective and less vulnerable. Key words Cyber threats, virtualization, network infiltration, cloud computing, SaaS. Internet has come of age through its over every(prenominal) journey. The progress has been a fast paced one and has sweep throughly brought about revolution in the digital world. The future promises much more. Virtualizations, Web 2.0, customization, Nano technology are few of the concepts that the medium of Internet offer (Livingston, 2010, 13). Objectives The report card looks into the mixed forms of threats faced by modern day digital world, this is followed by the overall assessment of the Internet journey, the present day mindset of technology and the future prospect and potential developments associated. This accompanied by the various kinds of threats faced and the potential damages that can be caused. The last disunite o f the paper contains the possible counter means and measures available which can make the world of Internet a more secure and reliable one to operate in. opinion of Cyber Security The term cyber security pertains to enacting actions that are necessary to be taken into account for safe and better services and operations in this medium. The field of cyber technology is a double edged sword. It enables achieving what would not be possible in the manual methods over work of months and weeks, at the same time despite creation lighting fast in its outlook, if it goes wrong, it can cause havoc. These threats come in various forms ranging from internal threats and variants to the external forces that are operating outside. They form an industry all together with billions of dollars being spent in the field and most of their activities being destructive and harmful to the common users in different ways. Since the cyber technology scope is part of almost every discipline, therefore every fi eld is at stake and risk from it. Ranging from the communication means to scientific research, governmental organizations all are operated on digital interface and as a result proper care and consideration must be given to the security factor. Broadly a complete set of entities exist that work as threat to the normal operational existence of computers and digital technologies. They come in form of viruses, Trojan horses, malwares, Spam and various other sources that are destructive in their nature and cause damages at different levels. Countering them requires comprehensive strategy formation at different levels. establishment agencies are a direct target in many instances and recent findings have shown that 2012 saw increased percentage of damages being inflicted upon government organizations as a result of comprehensive attacks launched against the networks of government structures. Department of homeland Security is equally warned and has aimed at assessing the rates and percent ages and the particular areas where these vulnerabilities are present and have attacked the networks (Powner, 2005). by means of their findings they have established that over the past year or so, the rate of increase has been alarmingly high and stands in the figure of over 600 percent increase. FBI theater director dealing with the vulnerabilities and overall nature and structure of technology presented a very alarming outlook of technology and stated that considering that amount of increase and overall tendencies of attacks on the governmental orga
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.