Ask a question from expert

Ask now

A Discussion on Cyber Wars and Security

In our digital age, the issues of cybersecurity are no longer just for the technology crowd; they matter to us all. Whether you work in business or politics, the military or the media—or are simply an ordinary citizen—this is an essential read.

6 Pages1274 Words166 Views
   

Added on  2023-04-23

About This Document

This study discusses about the ways in which pirates have attacked as well as continue to harm the cyber infrastructure of organizations and what measures we must take to be better prepared to tackle these threats. The history of cyberspace and cyber security is investigated and the most common types of cyber threats are identified. The study continues further to provide solutions to general users and board members of organizations to grow better equipped in tackling the threats and the role humans play in making cyber-attacks happen.

A Discussion on Cyber Wars and Security

In our digital age, the issues of cybersecurity are no longer just for the technology crowd; they matter to us all. Whether you work in business or politics, the military or the media—or are simply an ordinary citizen—this is an essential read.

   Added on 2023-04-23

BookmarkShareRelated Documents
Running head: A DISCUSSION ON CYBER WARS AND SECURITY
A Discussion on Cyber Wars and Security
Name of the Student
Name of the University
Author Note
A Discussion on Cyber Wars and Security_1
1A Discussion on Cyber Wars and Security
Introduction
This study discusses about the ways in which pirates have attacked as well as continue
to harm the cyber infrastructure of organizations and what measures we must take to be better
prepared to tackle these threats. To do this, the history of cyberspace and cyber security is
investigated and the most common types of cyber threats are identified. The study continues
further to provide solutions to general users and board members of organizations to grow
better equipped in tackling the threats and the role humans play in making cyber-attacks
happen.
A Discussion on Cyber Wars and Security_2
2A Discussion on Cyber Wars and Security
Discussion
For most businesses, there exists a significant knowledge gap relating to cyber
security among the board level. This knowledge gap can be alleviated by Chief Information
Security Officers (CISOs) who can advise the board members on this subject in easily
understandable business friendly terms. The CISOs ensure this through four steps which are –
Understanding of the board’s philosophy towards managing risks
Building profiles of risks pertaining to the industry
Establishing real metrics by measuring cyber risks
Providing continuous improvements in demonstrating cyber resilience
Solutions like Cisco Security Advisory Services are delivered through the hands of
these CISOs and help in better understanding the risks faced by an organization (Allen et al.,
2015). The knowledge gained can aid in making more effective decisions in mitigating risks.
Cyberspace refers to visualization of the entire interconnection of digital networks
and technologies that enable operations to be performed digitally. This includes the World
Wide Web (www) as well as the different internet and intranet infrastructures used by
organizations and the military. Though cyberspace may resonate with Internet and appear
similar, they are quite different. Internet is the physical form of all digital networks while
cyberspace is the virtual world that came to being due to the existence of Internet.
With the advent of Internet, arose the risk of cyber threats that are meant for theft of
confidential information, damage to software, electronic data and hardware and even
disruption of services. This has led to creation of security infrastructure, techniques and
guidelines to prevent these risks from compromising computers and network systems. With
increasing reliance on computers, internet, wireless services and Bluetooth devices, the
importance on cyber security is rapidly growing. It all began when a computer hacker from
A Discussion on Cyber Wars and Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview about Cyber Terrorism | Report
|12
|2450
|129

Cyber Security Threat Management | Assignment
|9
|2180
|85

Cyberspace and Cyber Warfare - PDF
|4
|682
|63

Fog of Cyber War
|7
|1493
|11

Mission-Critical Components of a LAN | Study
|19
|3346
|30

Prevention of Cyber Attacks - PDF
|11
|3273
|153