Analyzing Cybersecurity: Professional Issues in Modern Computing

Verified

Added on  2023/06/14

|4
|605
|459
Essay
AI Summary
This essay discusses the increasing vulnerabilities in technology and the rising number of cybersecurity attacks, emphasizing the need for enhanced data protection. It suggests implementing firewalls, utilizing cloud computing, and educating staff about security issues. Physical security measures like biometric scanners and IAM roles in cloud computing are also highlighted. The importance of data backup using big data is stressed to prevent data loss from hacking. The essay concludes that investing in cybersecurity is crucial for protecting organizations' data, reputation, and future operations. Desklib offers additional resources for students seeking to further understand cybersecurity and related topics.
Document Page
Running head: PROFESSIONAL ISSUES IN COMPUTING
Professional Issues in Computing
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1PROFESSIONAL ISSUES IN COMPUTING
With the advancement in the technologies there are vulnerabilities that are involved in the
technologies. There are loopholes that are created in the various networks of the organization
(Massey 2017). With the number of reports of the rising number of cyber security attacks, there
is need for the increase in the protection of the data and the information of the organizations.
The various cyber security measures that may be taken are the introduction of the
firewalls for the various interface in order to protect the data and the information of the
organization. The use of the cloud computing methodology for the protection of the data is an
important method for the cyber security purpose (Elmaghraby and Losavio 2014). The use of the
cyber security needs to be made in the various fields such as those of information technology,
medicine, science and many other departments, which involve the inclusion of the large number
of important information. The other basic strategies may be applied that is to teach the staff and
the employee regarding when the security issues may arise (Gordon et al. 2015). The
introduction of the physical security such as the use of the biometric scanners may be involved
for the protection of the data and the information of the organization. The use of the IAM role in
the cloud computing method of the cyber security is an important source for the protection of the
data and the information (Von Solms and von Solms 2018). There may be a number of data loss
when the hacker hacks the system of the organization. Thus it is important for the organization to
store the data in some other location. The use of big data may be made for the storage of the data
and the information such that when the data loss takes place through the system or the network
then there is a back up of those data.
Thus it can be conclude that the cyber security is an important issue that needs to be
addressed for the saving of the data and the information of the various organization. The
Document Page
2PROFESSIONAL ISSUES IN COMPUTING
investment in the field of the cyber security will save the organization in the future from the
further data loss and will also be helpful in the saving of the reputation of the organization.
Document Page
3PROFESSIONAL ISSUES IN COMPUTING
References:
Von Solms, B. and von Solms, R., 2018. Cyber security and information security–what goes
where?. Information & Computer Security, (just-accepted), pp.00-00.
Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2015. Externalities and the magnitude of
cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb
model. Journal of Information Security, 6(1), p.24.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety,
security and privacy. Journal of advanced research, 5(4), pp.491-497.
Massey, D., 2017. Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical
Systems. In Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber
Defense (pp. 39-39). ACM.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]