Preview

research paper

Best Essays
Open Document
Open Document
2972 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
research paper
USERS who LACK the KNOWLEDGE of PROTECTING THEIR SYSTEMS

“THE SINGLE MOST IMPORTANT CYBER SECURITY VULNERABILITY FACING IT MANAGERS TODAY”

Bernadette R. Morrison UMUC, CSEC 610 Individual Assessment Dr. Sudesh Kannan March 31, 2013

Table of Contents

Introduction ...............................................................................................................................1
The Internet................................................................................................................................2
Users Who Lack the Knowledge of protecting their systems....................................................4
Why is Knowledge so important? .............................................................................................6
Potential Impacts........................................................................................................................7
Mitigation...................................................................................................................................8
Conclusion..................................................................................................................................9
References.................................................................................................................................10

Introduction
Cyber usage has become one of the leading digital infrastructures that run our world. We use these infrastructures through cell phones, TV’s, ATMs, and most importantly computer networking. Internet usage is growing every year, and every year more and more users log on which has become part of our everyday lives. Unfortunately, as we grow with technology so are those who are willing and able to use the internet against us. Cyber attackers/hackers try to use these resources against



References: BARTHOLOMEW, P. (1998, April 1). Easing TCP/IP network management with novell 's DNS/DHCP services. Retrieved april 29, 2012, from Techcenter: http://support.novell.com/techcenter/articles/ana19980402.html Brodfuehrer, B Dacey, R. F. (2001). Information Security: Weaknesses place commerce data and operations at serious risk: GAO-01-1004T. GAO Reports, 1, 37. Retrieved from http://www.gao.gov/new.items/d011004t.pdf DIPERT, R Evenson, J., Cofsky, J., & Almazan, A. (2010). The Art of Cyber War -- Asymmetric payoffs lead to more spending on protection. Chart. p. 66. Retrieved March 26, 2013 Government Accountability Office GAO Miniwatts Marketing Group. (2012, February 13). Internet World Stats. Retrieved from Usage and population Statistics: http://www.internetworldstats.com/stats.htm Obama, b Plunkett, D. A. (2013, March 14). Are We Ready To Defend Cyberspace? Webinar. Maryland. http://www.umuc.edu/securitystudies/events.cfm Schultz, E Technet. (2013). Security planing. image. Retrieved March 26, 2013, from http://technet.microsoft.com/en-us/library/cc723503.aspx VanDerwerken, J., & Ubell, R

You May Also Find These Documents Helpful

  • Powerful Essays

    Kim, D. & Solomon, M. G. (2012). Fundamentals of information systems security . Sudbury, MA: Jones & Bartlett Learning, LLC.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Research Paper

    • 449 Words
    • 2 Pages

    I am choosing Cisco company to discuss its information technology roadmap. “The TelePresence Technology Group 's integrated portfolio will consist of the following product groups: Immersive TelePresence: The flagship Cisco TelePresence System 3000 series, including the Cisco TelePresence System 3000/3010 and Cisco TelePresence System 3200/3210, will continue to serve as the optimized experience for scalable deployments.”…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Research Paper

    • 1166 Words
    • 4 Pages

    Part 1: Answer the Module Review Questions listed below. These questions were chosen to demonstrate your understanding and help you assess your progress.…

    • 1166 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Research Paper

    • 1085 Words
    • 5 Pages

    Considering the introduction of a new product, you are currently in the 34 percent marginal tax bracket with a 15 percent required rate of return or cost of capital. This project is expected to last 5 years and then, because this is somewhat a fad product, this will be terminated. The following information describes the new project:…

    • 1085 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Research Paper

    • 615 Words
    • 3 Pages

    In week three of my syllabus, my objectives were too differentiate between qualitative and quantitive methods of research. Too differentiate; Qualitative methods provide the context against which to more fully understand those results. They capture what people have to say in their own words and describe their experiences in depth. Qualitative data provides the texture of real life in its many variations; it gives insight into the reasoning and feelings that motivate people to take action. In short, quantitative methods are standardized, systematically obtaining succinct responses from as many clients as possible.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Digital security….the term is almost a paradox in that there is no such thing as security when it comes to secure computing. At best, threats to digital security can be lessened and sometimes prevented but there is no such thing as an impenetrable defense. Corporations are constantly plagued by computer viruses and hacker attacks are on the rise leaving corporate networks vulnerable. It is estimated that 90% of all businesses every year are affected by security breaches to the tune of some $17 billion. Beyond the enormous costs that can easily wipe out a company’s IT budget, there are far-reaching business repercussions. Day-to-day business operations can be disrupted, customers alienated and a Company’s once good reputation tarnished. With the emerging security threats from a Company’s insiders to the sophisticated cyber terrorist, security breaches are clearly on the rise.…

    • 1133 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Information is what keeps this seemingly chaotic world functioning systematically. Not so long ago, information was physically present, printed or written on papers. To convey important information or messages, we used letters that took some time to reach its destination. Once our civilization invented and learned how to use electricity to store and send information, we never stopped since. Most of our important information is now being created, stored and sent through vast network of information superhighways. Information security threats were present even before we went digital and information security threats pose much greater…

    • 1058 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Govt Ethics

    • 1775 Words
    • 8 Pages

    The purpose of this report is to describe how the government can help private industry to better manage improved cyber security and their responsibility to protect national security through implementing good cyber security controls.…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Disec

    • 1366 Words
    • 6 Pages

    As the digital age progresses and computers become more prominent, the issue of cyber security comes into question. Governments have taken measures to make guidelines and laws regarding computer hacking within their own countries, but what can they do about issues dealing…

    • 1366 Words
    • 6 Pages
    Powerful Essays