Cybercrime

Cybercrime

Introduction

Cyber security, which is similarly referred  to as the security for  information technology, centers on defending computers, systems, programs, and documents from inadvertent or illegal access, alteration, or obliteration. The day to day life of an organization that deals with information, financial strength, and general safety rely on a steady, innocuous, and robust cyberspace which includes security.

Felici, n.d. states that internet and its fundamental structure are susceptible to a varied range of jeopardy starting from both corporeal and computer-generated dangers and threats. Erudite cyber performers and states exploit susceptibilities to take information and cash and are increasing competences to disturb, terminate, or intimidate the conveyance of essential services.

Companies that deal with technology and rely on it for their day to day running are often faced with the risk of their information falling into the hands of unauthorized individuals. This puts the organizations at a risk of losing their valuables or even falling into the hands of criminals who may use the information for personal gain. To avoid this, companies always trust in counter measures and installation of softwares in their systems that do not allow access by unauthorized individuals which may mean any individual who does not work in the organization. This ensures that the only individuals who gain access to information have to undergo some sort of verification.

Any information security device is based on the five pillars of information assurance which, when narrowed down comes to availability, integrity, non-repudiation, confidentiality and authentication. Information assurance when lightly put are a set of functions aimed at protecting and defending both the information and information systems.to achieve this, it must put in place measures that will provide for reinstatement of information systems by including defense, exposure, and response capabilities. This will enable the company to restore any corrupted information system in the case of an attack, exposing any trial to hack into the system and the counter measure which may include shutting down the entire system to avoid access by the unauthorized individuals this is according to Voeller (2014).

Product review

Vaseashta, Susmann, & Braman, n.d. in their work asserts that one of the ways to avoid cyber-crime is by using authentication logins in the systems. This is a method where all individuals who want to access the database are required to have a user account in the database and a personal password which they are encouraged not to share with anybody. This method ensures that only the authorized individuals who have the accounts and password can login into the system and access the information and files they need. The advantage of this system of protection is that it offers the organization two options which are the server login and the user login. The persons with the server login are the only ones authorized to make changes in the system, this may include adding information or withdrawing information from the system. This ensures that even if a user shares his or her password, the unauthorized individual will not be able to tamper with the information in the database. The only risk they will be having is the unauthorized access to their information.

According to Bayuk ( 2012) the weakness of this method is that even if an unauthorized individual gets access to the password and logs in, the system will not be able to detect it as a breach hence the information and system will be at the mercies of the individual. This means even if it is safe from unauthorized frequent access, without proper monitoring, it still risks the information and security of the organization.

Increasing cyber security

According to Kazan (2016) by using the user verification and login to protect the organizations information, it needs to be reinforced with measures that will ensure that even if an unauthorized individual stumbles upon a user name and the password, he or she won’t be able to access the organization’s database thus their information will be safe.  This may include the use of verification questions which may include even a secret name. Also, the organization may set the systems in a way such that it automatically logs itself out when the user is inactive for some minutes. This will ensure that at no any moment will the user leave the account logged in. This will help in stopping individuals who take chance of unsuspecting users who leave their accounts logged in to access the information through the account.

Being connected to the internet exposes organizations to cyber offenders and others who obligate identity robbery, scam, and harassment. Any time an individual connects to the web they make conclusions that touch on their cyber security. Developing cyber coercions need commitment by the entire world community to come up with a harmless cyber.

Amoroso, n.d. asserts that cyber security assurance is intended to alleviate losses from a diversity of cyber events, which includes data breaks, commercial disruption, and system mutilation. A vigorous cyber security assurance souk could aid lessen the amount of fruitful cyber assaults by: endorsing the acceptance of defensive procedures in profit for more handling; and boosting the execution of the best ways of grounding premiums on a protected level of self-defense. Numerous corporations sacrifice accessible rules, though, quoting as foundations for the apparent great cost of those guidelines, misperception about whatever they cover, and ambiguity that their corporations will undergo a cyber attack.

References

Amoroso, E. Cyber security (1st ed.).

Bayuk, J. (2012). Cyber security policy guidebook (1st ed.). Hoboken, N.J.: Wiley.

Felici, M. Cyber security and privacy (1st ed.).

Kazan, H. (2016). Contemporary Issues in Cybersecurity. JCR, 1(1), 1. http://dx.doi.org/10.19030/jcr.v1i1.9745

Vaseashta, A., Susmann, P., & Braman, E. Cyber security and resiliency policy framework (1st ed.).

Voeller, J. (2014). Cyber Security (1st ed.). Wiley.

Place this order or similar order and get an amazing discount. USE Discount code “GWEXDDSRGCF10” for 10% discount