Cyber Security Communications Assignment - University Name

Verified

Added on  2022/08/25

|4
|636
|31
Homework Assignment
AI Summary
This assignment delves into the realm of cyber security, examining the dual nature of hacker talent and its potential for both malicious and beneficial applications. It explores how hackers leverage their skills to exploit system vulnerabilities, which are weaknesses in hardware or software that can be exploited to compromise a network. The assignment discusses various methods for identifying and mitigating these vulnerabilities, including penetration testing, security audits, and the implementation of software security solutions. The student's work addresses the importance of understanding cyber threats, such as impersonation and exploits, and proposes ways to channel hacker expertise towards developing secure technologies and preventing cybercrimes. The assignment also highlights the need for continuous monitoring and proactive security measures to safeguard systems from evolving cyber-attacks.
Document Page
Running head: CYBER SECURITY COMMUNICATIONS
CYBER SECURITY COMMUNICATIONS
Enter name of the Student:
Enter name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY COMMUNICATIONS
Question 1:
The hackers are mainly engaged to develop the bad technology. The bad technology is
the system interlopers are using to attack the systems and these type of technologies are
developed in cycle (Kizza 2015). So hacker technology is prosperous. But there are many
ways to mitigate this talent of the hackers being used for the criminal purposes. To become a
hacker, intelligence, enthusiasm, perseverance and determination are required. This talent can
be used for developing the useful technologies (Xu, Hu and Zhang 2013). If the hackers are
used their talent of hacking other systems, then they can prevent many unethical works which
cause the daily life of the user or the system. There are many types of attack by which it can
be possible which are as follows:
i) Litiyersoiiation- It is a process of stealing the access rights of authorized users. By this if
any person store any information which is dangerous for the government or the public, the
hackers can steal the access of the user and destroy the information.
ii) Exploits- By this process, hackers can easily destroy any type of harmful software or
operating systems.
There are many other process by which hackers can use their talent for good reason
and not used for criminal purposes.
Question 2:
System vulnerabilities are the weakness in hardware or software on any server or the
client which can exploit by the determined intruder to achieve the access to any network or
shut down the network.
There are many ways to detect or identify these system vulnerabilities which are as
follows:
Document Page
2CYBER SECURITY COMMUNICATIONS
i) Penetration tests- Companies appoint individuals to discover the methods to crack into
their own systems (Chen and Mili 2013). Whenever the authorized hackers broke this, then
they disclose the tricks to owner of the system rather damage anything. Penetration test is
actually useful to illustrate the process of real hacking. Some of the times this test requires by
the security standards.
ii) Audits- By hiring the auditing team is the other process of identifying the vulnerabilities.
They make the detailed report of the security issues the company experiences from poor
practices of the staff to out of date software (Teng, Chen and Martinez 2013). It provides the
information about the security risks.
iii) Software solutions- The software is always changed and introduced new types of
vulnerabilities, so for this reason, companies need monitoring the security continuously to
protect the company from the cyber-attacks. The tools of software security can provide day to
day report of vulnerabilities present in the system.
Document Page
3CYBER SECURITY COMMUNICATIONS
References
Chen, Q. and Mili, L., 2013. Composite power system vulnerability evaluation to cascading
failures using importance sampling and antithetic variates. IEEE transactions on power
systems, 28(3), pp.2321-2330.
Kizza, J.M., 2015. Guide to computer network security (p. 341). London: Springer.
Teng, J.H., Chen, C.Y. and Martinez, I.C., 2013. Utilising energy storage systems to mitigate
power system vulnerability. IET Generation, Transmission & Distribution, 7(7), pp.790-798.
Xu, Z., Hu, Q. and Zhang, C., 2013. Why computer talents become computer hackers.
Communications of the ACM, 56(4), pp.64-74.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]