Studyspark Study Document

Cyber Security Most Important Cyber Research Paper

Pages:8 (2328 words)

Sources:8

Subject:Technology

Topic:Cyber Security

Document Type:Research Paper

Document:#93533978


The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012).

In addition to that, the operating system of Apple is now considered as one of the most favored platform for hackers due to loopholes in the framework. Similarly, social networks such as Facebook have also been guilty of retaining an obsolete database, which led to one of the biggest security breaches in the recent era of internet (Chabrow, 2013). Thus, it can be said that personal computers are affected due to the negligence of the software vendors but its impact cannot be ignored.

Addressing the impact:

a) Software Vulnerability:

In order to address the impacts that unpatched systems have on cyber security, Lin (2006) has stressed that it is essential for organizations to develop efficient access controls as well as install regular updates for their quarantine antivirus software and firewalls. When an organization attains effective security against external access, coupled with creating increased awareness among the employees to take precautionary measures while using the internet, the impact of unpatched systems can be greatly decreased. In addition to that, the operating system providers should provide timely updates as soon as a new threat emerges (Lin, 2006).

In this regard, software developers are required to provide the enterprise consumers with timely updates and patches for the security software. As soon as a new threat is identified, developers or the hired staff should be able to provide security against the threats in the form of patches (Lin, 2006). In addition to that, the employees should be directed to use the internet in a responsible and defensive manner. They should not be allowed to visit infected websites from their workplace. In the end, it is advised that the threat of unprotected or unpatched systems should not be taken lightly by organizations and they should be given due importance.

b) Hardware Vulnerability:

The impact of system updates with regards to hardware should also not be underestimated. Older chipsets, which are near the end of their cycle, are exposed to security breach from the external environment. Organizations can overcome this problem through hiring a dedicated IT staff, which would overlook the transition from older hardware to current or next generation hardware (Villasenor, 2011). It has also been stressed that hardware vulnerability is greater as the size of the organization increases. Thus, organizations with greater resources should allocate larger resources to improving the hardware vulnerability as compared to smaller organizations (Villasenor, 2011).

Villasenor (2011) also stated that a number of steps can be taken in order to minimize the underestimated vulnerability of hardware. The first step is that the semiconductor manufacturers should adopt a change in design. The reason for this is that a changed semiconductor would eradicate the hardware vulnerability for a considerable amount of time till the hackers familiarizes themselves with the new hardware. The second step in the removal of hardware vulnerability is to establish a capability on the national level for responding to attacks in a timely manner. Thus, he has stressed the importance of a central body against cyber crimes, who would track the perpetrator and make him accountable for his actions.

The third step mentioned by Villasenor (2011) is that the chips manufacturers should carry out extensive testing on the new hardware in order to ensure that the chips are not corruptible for the foreseeable future. Such an action would prolong the useful life of hardware in terms of their vulnerability towards attacks. The fourth and final step is that there should be in0built capability in the new chips, which would enable them to identify external threats and eliminate them before they cause any damage. The aforementioned steps should be considered as a standard in the industry, which would support the objective of eliminating weakness pertaining to hardware in the cyber security of organizations.

Bibliography:

BITS. (2011). Malware Risks and Mitigation Reports. Retrieved March 11, 2013 from http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf

Daily Tech. (2012). Apple Admits its Macs Have a Malware Problem. Retrieved March 11, 2013 from http://www.dailytech.com/Apple+Admits+Its+Macs+Have+a+Malware+Problem/article24451.htm

Chadrow, E. (2013). Examining How Facebook Got Hacked. Retrieved March 11, 2013 from http://www.bankinfosecurity.com/examining-how-facebook-got-hacked-a-5518

Cole, E. (2012). Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Rockland, MA: Elsevier Science.

Lin, P. (2006). System Security Threats and Control. Retrieved March 10, 2013 from http://www.nysscpa.org/cpajournal/2006/706/essentials/p58.htm

PC World. (2009). Unpatched Applications Are #1 Cyber Security Risk. Retrieved March 9, 2013 from http://www.pcworld.com/article/172082/Unpatched_Applications_Are_1_Cyber_Security_Risk.html

Sans. (n.d.). Survival Time. Retrieved March 10, 2013 from http://isc.sans.edu/survivaltime.html

Swan, D. (2013). Cybersecurity Vulnerabilities Facing IT Managers Today. Retrieved March 9, 2013 from http://www.academia.edu/1416741/Cybersecurity_Vulnerabilities_Facing_IT_Managers_Today

Villasenor, J. (2011). Ensuring Hardware Cybersecurity. Retrieved March 11, 2013 from http://www.brookings.edu/research/papers/2011/05/hardware-cybersecurity


Sample Source(s) Used

Bibliography:

BITS. (2011). Malware Risks and Mitigation Reports. Retrieved March 11, 2013 from http://www.nist.gov/itl/upload/BITS-Malware-Report-Jun2011.pdf

Daily Tech. (2012). Apple Admits its Macs Have a Malware Problem. Retrieved March 11, 2013 from http://www.dailytech.com/Apple+Admits+Its+Macs+Have+a+Malware+Problem/article24451.htm

Chadrow, E. (2013). Examining How Facebook Got Hacked. Retrieved March 11, 2013 from http://www.bankinfosecurity.com/examining-how-facebook-got-hacked-a-5518

Cole, E. (2012). Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization. Rockland, MA: Elsevier Science.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Cybersecurity As an Organizational Strategy an Ethical and Legal Perspective...

Pages: 10 (3101 words) Sources: 10 Subject: Business Document: #13203091

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Studyspark Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Subject: International Relations Document: #27491269

Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable

Studyspark Study Document

Cyber Forensics and Legal Considerations

Pages: 11 (3240 words) Sources: 11 Subject: Law Document: #74919824

Cyber Forensics and Legal Considerations: Is the Law Keeping up with Advancing Technology?
Introduction
Because of the digital age and the possibilities it has introduced, digital forensics is now a necessity within the realm of law enforcement. However, there are numerous considerations to be made within this realm: constitutional law, property law, contract law, tort law, cybercrime, criminal procedure, evidence law, and cyber war. This paper will examine how the

Studyspark Study Document

Cybersecurity Vulnerability Issues

Pages: 10 (2738 words) Sources: 10 Subject: Education - Computers Document: #36589313

Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware

Studyspark Study Document

Cyber Threats: Executive Summary It Is Important

Pages: 4 (1475 words) Sources: 3 Subject: Education - Computers Document: #83225814

Cyber Threats: Executive Summary It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in

Studyspark Study Document

Cyber Security Ethical Issues Associated With Ransomware

Pages: 3 (893 words) Sources: 3 Subject: Education - Computers Document: #22055267

Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents

Join thousands of other students and

"spark your studies".