logo

Cyber Security Issues in Modern Times

   

Added on  2023-01-10

11 Pages2481 Words97 Views
 | 
 | 
 | 
Running head: CYBER SECURITY ISSUES IN MODERN TIMES
Cyber Security Issues in Modern Times
Name of the Student
Name of the University
Author Note
Cyber Security Issues in Modern Times_1

CYBER SECURITY ISSUES IN MODERN TIMES1
Table of Contents
Introduction................................................................................................................................2
Cyber security threats in Manufacturing................................................................................3
Cyber security threats in Healthcare......................................................................................4
Cyber security threat in national security...............................................................................4
Cyber Security Threats in Financial Sector...........................................................................5
Cyber Security Threats in Tourism Industry..........................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................8
Cyber Security Issues in Modern Times_2

CYBER SECURITY ISSUES IN MODERN TIMES2
Introduction
Cyber security is an important concept that has gained prominence in the present
times. It is an emerging issue that has to be dealt at the global level as the web of technology
is expanding. It is the use of techniques that are designed for the protection of different
networks, devices and designs that are regarded as patent of one organization. It is the
technique of the providing security to the crucial information that an organization possesses.
The other term used for referring to cyber security is information technology security. It
holds an eminent place in various organizations as they are used for the protection of
sensitive data (Von Solms & Van Niekerk, 2013). The governing organizations, military
organizations, financial bodies as well as medical organizations are the eminent ones that
utilize networking techniques to protect confidential information. The devices that are used in
providing treatment utilizes the new and advanced techniques that requires the use of data
collection to provide efficient treatment to the patients. The data of the patients is sensitive in
many cases and requires that it should not be shared with anyone other than the doctors. If the
information is not secure that will lead to unauthorized access posing a threat to the personal
information. The information can be used by people indulged in malpractices to cause
potential harm to them. Organizations transfer sensitive data by using the web of networks
that are prone to cyber-attacks that can lead to the theft of intellectual property. The theft of
intellectual property can inflict losses on the company leading to negative impact on the
growth of the company. The military organizations store information in technologically
advanced devices that consist the data of national security. The information is essential to
maintain the security of the nation and is prone to threat. The increase in the transfer of data
by using technologically advanced devices has increased the chances of risk faced by the
organizations all over the world (Craigen, Diakun-Thibault & Purse, 2014). The focus of this
Cyber Security Issues in Modern Times_3

CYBER SECURITY ISSUES IN MODERN TIMES3
paper will be on the cyber security threats that are experienced all over the world in present
times.
Cyber security is a vast network that encompasses all the organizations and their
activities. It aims to provide network security, application security, data security, database
security and many more. The risks faced in the sphere of cyber security are challenging as
they are constantly changing with the advancements in the technological sphere. In the earlier
times it was possible to protect the information as the threats faced by the organizations were
known but the situation is different in present times. The technological advancements have
led to the increase in the threats faced and the severity of the issues has increased. The
organizations should adopt ethical practices to decrease the issues faced that are constantly
rising in the present times.
Cyber security threats in Manufacturing
Cyber security threats in the manufacturing process is the common issue that has been
reported in the sphere of industries and corporations. As the competition is increased amongst
the companies it creates chances that the information will be stolen by other companies.
Networking machinery involves the use of computers including software that increase the
productivity of the company. With increase of using the technology in the company the risks
are also increasing. It has been highlighted that the companies who are smaller in scale are
prone to face cyber security threats that includes the breach of data (Wells et al., 2014). It has
been reported that 50 percent of the companies that operate on smaller levels are prone to
face cyber threats. The manufacturing sector is not the only one that is exposed to cyber
threats but it includes the non-financial organizations and also those who do not use the
technological advanced techniques. In the manufacturing sector the breach of data means to
cause disruption in the operation activities. That can cause damages to the property of the
Cyber Security Issues in Modern Times_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Social and Cultural Impact of the Use of ICT Associated With Cyber Security | Report
|15
|4018
|9

Cybersecurity for Office and Home
|14
|3454
|46

Research in Advanced E-Security
|7
|1628
|206

Assignment on Cyber Defense in Web Based Attacks
|7
|1418
|22

The hackers are continued to target the social media
|3
|731
|14

Cyber Security – Challenges and Solutions
|13
|3663
|313