This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Cyber Vulnerability

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Cyber Vulnerability

Recent studies depict that there are emerging threats in the cybersecurity system. These vulnerabilities are caused as a result of the exponential growth or increased internet interconnections. The cyber-attacks incidences usually have grievous repercussions and are also disastrous. The attackers involved in this criminal activity can be grouped into three categories: online criminals, ‘hactkivists” like the Anonymous, who majorly engages in the undesirable act for the protest, and the nation states attacks. The online criminals and the “hacktivists’ actions are normally motivated by the desire for money, while the nation-state may engage in the act to harm its citizens (Hypponen, 2011).

The measures that can be utilized in enhancing the nation’s cybersecurity include restricting access to wireless networks by ensuring that only authorized users are allowed by relevant Information Technology agencies. Secondly, the government should implement or enact a security assessment plan that seeks to identify cyber threats, vulnerabilities, and threats. The country may also acquire a cyber-insurance as a bid to safeguard potential costly outcomes derived from cyber-attacks. Finally, the nation’s IT agencies should adopt a purpose-made policy on cybersecurity that may address several needs, such as raising awareness of potential risks and offering insight into the potential vulnerabilities and their solutions.

The steps I have taken to ensure protection against cyber-attacks include using strong passwords and changing them regularly through the use of the password management application. Secondly, I make the use of full-service internet security suites such as Norton Security for protection against emerging and existing malware. Thirdly, I tend to update myself on major security breaches as a way of keeping me in the know of the data the cyber attackers accessed and make a change on my password. Lastly, I have strengthened my home network by encrypting my VPN and password.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Hypponen, M. (Director). (2011). Three types of online attack [Motion Picture]. https://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack/discussion?language=en

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask