I’m studying for my Communications class and need an explanation.
Reply with 50-100 words for below 3 posts
1. The internet is playing a significant role in the current world. Both private and government organizations are taking advantage of the growing internet to better the operational services and improve organizational performances. However m due to increased technology nowadays, the internet has become unsafe, subjecting such organizations to a wide range of vulnerabilities and threats(Probst, 2011). For instance, the internet crimes incidence has become common, and hence several firms end up becoming a victim of the crimes. Since the internet is accommodating all types of peoples, including fraudsters, private and government agencies are finding alternatives on how to elevate from internet threats and vulnerabilities. The companies that entirely relies on internet transactions have become prone to these threats. In general, those companies that process enormous amounts of financial and customer information have the likelihood of data breaching and theft.
However, there is a wide range of methods that these firms can use to mitigate internet threats, vulnerabilities, and any other future intrusion. For instance, ensuring the protection leakage against intellectual property is an essential approach that can be implemented to ensure that the safety of the employees’ information. This can be achieved through blocking transmissions or any form of attachments that can leak the information of their data, such as emails(Schneidewind, 2010). An alternative is an essential strategy that can ensure that there is a reduction of the potential and efficacy spur employees and hinder them from finding another way of communication that cannot be monitored by the company. Additionally, a large technology firm should take a rigorous strategy of mitigating threats on its Security and IT information security. Therefore, it should not allow any of the employees to keep the data of the company anywhere other than the company issued internet devices. Also, the firm should restrict the employees from satellite offices in bringing company-issued computers to the headquarters offices. All these approaches would ensure that the sensitive information of the company is not leaked whatsoever.
Probst, C. (2011). Identifying and Mitigating Insider Threats. It – Information Technology, 53(4), 202-206. doi: 10.1524/itit.2011.0644
Schneidewind, N. (2010). Metrics for mitigating cybersecurity threats to networks. IEEE Internet Computing, 14(1), 64-71. doi: 10.1109/mic.2010.14
2. Potential Vulnerabilities attempts and threats of intrusion
Without seeing the reports of the new threats that are breaches of the data or information and the cybercrime or the destruction of the potential of the national infrastructure it is very hard to read on the online news sources. For making some of the threats they provide political and the driver of the profit motivates and sees bigger than the real ones in it. The official government is of the United States having warned about the attacks of the cyber potentially that are devastating. To justify some of the requests or orders for the increased cyber security of the national such type of warnings are used in it (Alonso, 2015).
As well as these are also used for the restrictions on the networks of the public. About the real extent of the threats, many of the experts have expressed it that is not more surprising in it. On the other side, the threats of the new cyber are emerging and growing these days. To attack more data or information is online and vulnerable and many of the devices of the new internet-connected are inviting new risks day by day in it. The production of the malware has to be matured in some of the industries (Kusnardi, 2019).
The agencies of the business, as well as all the businesses, have suffered a lot of attacks of the real are mainly attributed to the actors of the national state. Some of the methods are taking place for identifying the new threats and these are also applicable to the trends of the vulnerable among the others. In these methods, some of the key areas of the threats are also identified that are analysed by using those types of methods in it. Their main goal or aim is to help the groups of the information or data security that will make them stay ahead from the attackers (Poongodi, 2015).
Alonso, W. J., James McCormick, B. J., Miller, M. A., Schuck-Paim, C., Asrar, G. R., & McCormick, B. J. J. (2015). Beyond crystal balls: crosscutting solutions in global health to prepare for an unpredictable future. BMC Public Health, 15(1), 1–7. https://doi.org/10.1186/s12889-015-2285-1
Kusnardi, K., & Gunawan, D. (2019). Guillou-quisquater protocol for user authentication based on zero knowledge proof. Telkomnika, 17(2), 826–834. https://doi.org/10.12928/TELKOMNIKA.v17i2.11754
https://doi.org/10.1007/s13369-015-1822-7Poongodi, M., & Bose, S. (2015). A Novel Intrusion Detection System Based on Trust Evaluation to Defend Against DDoS Attack in MANET. Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 40(12), 3583–3594.
To provide essential services in the world of information technology has been developed to provide the private sector and governments an effective and fast way. As a result, these critical systems remain exposed to potential Internet attacks. Protect the public, the economy, government departments and the national security of the United States; the US policy is to prevent or minimize disruptions to our critical information infrastructure. The federal government is continually increasing its ability to manage cyber risks associated with critical information networks and systems. On January 8, 2008, President Bush signed Presidential Directive on National Security 54/Homeland Security, which formalized a series of ongoing efforts to further protect federal systems and reduce potential vulnerabilities, protect against intrusion attempts and to better anticipate future threats. In today’s world, both government and the private sector are struggling to provide a safe, efficient, and fast and separated to provide essential services internationally. As a result, these critical national infrastructure systems remain exposed to potential Internet attacks. The US policy is to prevent or minimize disruption of critical national infrastructure to protect the public, economy, government departments and the national security of the United States (govtech.com, 2008).
Although efforts to protect our federal network systems against cyber-attacks remain a collaborative effort across the government, the Department of Homeland Security (DHS) is the main responsible for the security, resilience, and reliability of the information technology (IT) in the communication infrastructure. National infrastructure remains a key venue for cyber attacks. The protection of critical infrastructure requires proactive measures to ensure forecasting cyber threats, continuous vulnerability analysis and the implementation of measures to ensure the success of the attacks. A successful cyberattack against critical national frustules can be costly and damaging, demanding that all efforts be devoted to the protection of these systems. Continuants who learn, adopt new measures and are aware of the trend are also required to keep abreast of changes and practices in cybersecurity and cyber attacks. Disappointment is one of the strategies to reduce the potential vulnerability of national infrastructure to cyber-attacks and intrusion attempts. This approach is also useful for analyzing and anticipating future threats to attack (Molander et al, 1998).
govtech.com. (2008). DHS Cyber Attack Protection Fact Sheet. Retrieved from, https://www.govtech.com/security/DHS-Cyber-Attack-Protection-Fact-Sheet.html
Molander et al. (1998). U.S. STRATEGIC VULNERABILITIES: THREATS AGAINST SOCIETY. Retrieved from, https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/assets-threats-vulnerabilities-01-en.pdf