Cyber Security And The Internet Security Essay

Published: 2021-07-29 17:25:06
essay essay

Category: Society

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
Businesses and people are using Internet for entertainment, e-business and e-commerce, social networking, and communication to the people and business, but there have always been threats to the Internet Security. Internet security is major concern in field of technology, because there are various personal, business and government data on the Internet. Today every businesses and organizations have their own security systems to reach their goals of information security. Internet security systems are created to reduce cyber attack risks, reliability, maintain confidentiality, and compliance with privacy laws and national security laws. However security standard that has been made, and laws brought by government are not more enough to protect Internet Security, so more advanced security and more strict law by government should be brought in action to protect Internet Security.
There are different kinds of security standards when integrating security approach in new systems. Some government agencies and organizations adopt well-established standards, while some companies make their own private security systems. Storing data Offsite has been beneficial for business to store data on cloud due to storage insufficiency. Devanney, the author of “Offsite Information Storage: Cloud Computing And Cyber Security Issue” explains that The Department of Justice divides cybercrime into three categories: the computer as target, weapon, and as an accessory (p3). Lost Internet connection can heavily affect those organizations, which use PSA system with the cloud. Devanney also claims that current PSA packages are beginning to partner with ERP in order to create more accessible software.
US Department of homeland security has conducted a campaign “ The. .n.ReferencesBailey, T., Kaplan, J. M.
, & Rezek, C. (2015). Repelling thecyberattackers. Mckinsey Quarterly, (3), 54-63.Department of Homeland Security. Stop.
Think. Connect. (2010) Retrieved from https://www.dhs.gov/about-stopthinkconnectDevanney, P., Quilliam, W.
, DuVal, C. W., & Santos, N. “.(2016). Offsite Information Storage: Cloud Computing and Cyber Security Issues.
Annual International Conference On Accounting & Finance, 75-78. doi:10.5176/2251-1997_AF16.37Szoldra, P. (2015). The 9 worst cyber attacks of 2015 Retrievedfrom http://www.
techinsider.io/cyberattacks-2015-12 The White House, Office of the Press Secretary (2015, January13). Announcement by the President on SECURING CYBERSPACE. Retrieved from https://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislat

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read