Running Head: CURRENT CHALLENGES FACING CYBER SECURITY 1
CURRENT CHALLENGES FACING CYBER SECURITY 12
(Name of School)
(Your Name)
(Course Code)
(Instructor’s Name)
(Date)
Current Challenges Facing Cyber Security
Abstract
Modern technology has been used today in various fields and it has proved to be of importance. Technology as a whole makes the world appear small in terms of distance due to fast transport and communication and a huge task to be less. Many people have been so dependent on technology, which is advancing fast. The technology faces quite several challenges with the main one being cyber-crimes in different organizations and that where cybersecurity plays its part in the protection of vital information from being accessed or destroyed by unauthorized individuals. Cybersecurity plays a significant role in ensuring that any computer-related information is secure, no harm can come to it or threat is detected early before it thrives (Raman, 2019, p.3). Despite that still, the cybersecurity faces a lot of challenges; the main objective of this paper is to focus on those challenges faced by cybersecurity, making it less effective in playing its role. Also on some of the measures that have been taken in preventing the crimes associated with computer systems (Sutherland, 2018, p. 27).
Introduction
The world today starting from an individual moving to the largest organizations, all at least have a computer system for either storing information or used in day to day activities. Human beings can communicate with their loved ones from the far distance, they can travel long distance within the shortest time possible, and also they make what is deemed to be less effective, to be efficient. This is how good the technology is and why people are obsessed with it day in day out. Before all this, there is still the fact that they are unable to safeguard their information mostly the private one (Sadeghi et al., 2015, p. 4). This is why this paper is of importance as it makes one realize that within a fraction of a second or a mini second one can lose over a million in his bank account, millions of passwords could be hacked, the funny part is that someone can give out your money for donation without your knowledge, a virus can be sent into your computer to disrupt it or malware this is mostly associated with computers. That is how cyber-crime is and you can imagine how the victims cope with such surprise events when they do occur, in some cases, others take their lives in such a situation. These may occur due to the lack of cybersecurity that allows computer and other machines to be exploited (Sutherland, 2018, p. 27).
Objectives
To come up with a strategy that can respond quickly from cyber incidents and also prevent them when they occur.
To ensure that there is integrity maintained and availability of linked systems.
Encourage the creation of cyber secured machines to fight cyber threats.
Literature Revi ...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
1. Running Head: CURRENT CHALLENGES FACING CYBER
SECURITY 1
CURRENT CHALLENGES FACING CYBER SECURITY
12
(Name of School)
(Your Name)
(Course Code)
(Instructor’s Name)
(Date)
Current Challenges Facing Cyber Security
Abstract
Modern technology has been used today in various fields and it
has proved to be of importance. Technology as a whole makes
the world appear small in terms of distance due to fast transport
and communication and a huge task to be less. Many people
have been so dependent on technology, which is advancing fast.
The technology faces quite several challenges with the main one
being cyber-crimes in different organizations and that where
cybersecurity plays its part in the protection of vital
information from being accessed or destroyed by unauthorized
individuals. Cybersecurity plays a significant role in ensuring
that any computer-related information is secure, no harm can
2. come to it or threat is detected early before it thrives (Raman,
2019, p.3). Despite that still, the cybersecurity faces a lot of
challenges; the main objective of this paper is to focus on those
challenges faced by cybersecurity, making it less effective in
playing its role. Also on some of the measures that have been
taken in preventing the crimes associated with computer
systems (Sutherland, 2018, p. 27).
Introduction
The world today starting from an individual moving to the
largest organizations, all at least have a computer system for
either storing information or used in day to day activities.
Human beings can communicate with their loved ones from the
far distance, they can travel long distance within the shortest
time possible, and also they make what is deemed to be less
effective, to be efficient. This is how good the technology is
and why people are obsessed with it day in day out. Before all
this, there is still the fact that they are unable to safeguard their
information mostly the private one (Sadeghi et al., 2015, p. 4).
This is why this paper is of importance as it makes one realize
that within a fraction of a second or a mini second one can lose
over a million in his bank account, millions of passwords could
be hacked, the funny part is that someone can give out your
money for donation without your knowledge, a virus can be sent
into your computer to disrupt it or malware this is mostly
associated with computers. That is how cyber-crime is and you
can imagine how the victims cope with such surprise events
when they do occur, in some cases, others take their lives in
such a situation. These may occur due to the lack of
cybersecurity that allows computer and other machines to be
exploited (Sutherland, 2018, p. 27).
Objectives
To come up with a strategy that can respond quickly from cyber
incidents and also prevent them when they occur.
To ensure that there is integrity maintained and availability of
linked systems.
Encourage the creation of cyber secured machines to fight cyber
3. threats.
Literature Review
This paper will give a view of the major threats to cybersecurity
and privacy protection. Introduction of One Time Password
(OTP) has also helped secure certain services in the network
like emails and other accounts (Sutherland, 2018, p. 27). The
current trend in the technology has left every solution to be put
in doubt because the cybercriminals use the same tools in
deploying their illegal tasks of hacking or spreading viruses.
Most people do not realize the power a computer holds until it
breaks down and stops functioning as usual. The machine, just
like human beings one can easily manipulate and make it do
what he or she wants to do with it despite the real owner, by
this it means that it doesn’t matter the position, location, and
ownership of the machine. This will not guarantee anyone that
their machines cannot be compromised (Dawson, 2016).
With the advancement in technology currently going on to
another level, imagine a free cybersecurity globe. The machines
and the computer invented don’t have a cyber-security in mind,
it will put the world at a greater risk given things like drone are
controlled freely in the sky, trains that use electricity, and
automated vehicles. This great efficiency which is positive for
now could turn out to be negative if cyber-crimes are not
eliminated or resolved as quickly as possible (Knowles et al.,
2015, p.75).
Artificial intelligence is created to behave more like human
beings as it detects any threat intrusion. It identifies mostly
what it has been trained to and it does the job well. This is a
tool designed to fight cybercrime. It can handle a large number
of issues and analyze them to be it organization’s emails, files
or site (Yampolskiy, 2016). It is good in the detection of
unknown threats that tend to take time to be noticed by other
software. As mentioned earlier is that some of the threat are
entertained by an ignorant individual who for instance get email
links but decide to risk clicking onto the link despite knowing
the risks. Awareness and training are required to such fellows
4. who risk a lot without knowing the outcomes of the threats
while at home(Taddeo & Floridi, 2018).
Cyber Security Challenges
There are different forms of cyber-crimes that include;
destruction of information, theft, blackmail, extortion,
manipulation, and services denial. The threats are mostly as a
result of tools like malware viruses, ransomware, ATM
skimmers, and spyware. Below are some of the challenges of
cybersecurity some are computer-related while others are a
result of human ignorance and lack of resources (Holt et al.,
2017).
Ransomware
This is the worst compared to other virus spread threats as it is
a malware used to force a customer or a business organization
to pay a ransom for the criminal to let go of any vital
information. It is reported that the number of the attack is still
increasing ranging now at about 37 percent. They tend to ask
for more pay since they have all the leverage (Holt et al., 2017).
The Internet of Things (Iot) Threat
This is involved with many devices that are currently in the
market and devices found at their homes. The percentage of
people with such devices that allow internet connection is also
rising at a faster rate. Due to this high connectivity, it makes
ever individually vulnerable to cyber-attacks. End users who
lack the knowledge of cyber-attacks they end up being victims
and it ends badly for them probably (Abomhara, 2015, p.81).
Data Manipulation
In this, the information is not stolen or destroyed but instead, it
is modified in a more different way making it difficult to detect
unlike with the case of data destruction. A minor alteration may
have a much bigger impact on the system functioning or the
whole grid (Leon, 2015).
Identity Theft
5. It focuses on the funds which are stolen using a fake identity or
rather a fraud. Most individuals are less likely to suspect such a
crime can happen on their watch they believe it when it’s
already too late when the crime has taken place. It is not
different from spyware which also involves stealing of data and
monitoring people for cybercrimes. Also Social engineering is
done by blackmailing individuals in gaining access to their data
or devices.
Lack of Leadership
As far as cybersecurity is concerned it can never be fruitful
unless the leadership of the organization is steady and
supportive. Trust is all that is required in an organization
without that then people can find themselves giving out
confidential information without knowing. Also, they need to
work closely with different sectors; through collaboration, they
can be rest assured that they can survive any harm on the way
(Brown, et al., 2015, p.46). Issues concerning cybersecurity
need to be taken more seriously by the leader to protect the
well-being of the organization. Most are vulnerable to attack
due to lack of leadership and collaboration (Guptaet al., 2016).
Training and Creating Awareness
This is typically for those who still have less knowledge of how
to handle detected threat. Through training and creating
awareness on the impacts of cyber-crimes more are enlightened
on the need to be prepared. The education sector has fewer
people who learn Information technology and this makes it
difficult to fight cyber-crime (Guptaet al., 2016).
Methods
Questionnaires were used in collecting on information from
individuals at home to people in the business organization
where the paper mainly entails the big question of the number
of occasions the cybersecurity has had encountered any threat
and the type of threat that was imminent. The data was collected
randomly in various premises to just give an insight into the
results(Gordon, 2018).
6. Results
Cyber-crimes have evolved with time and so are the many forms
of cyber-crimes. The worst of all was ransomware which
involved of holding of information than the cyber-criminal
requests a specific amount of money that is mostly high. Other
crimes like identity theft are hard to detect and are realized
once they have occurred. It’s clear that there are fewer people
who work with a computer system but yet have a little
knowledge of operating them or minimizing small threats that
are initiated by amateur hackers who hack for fun. Usernames
and passwords are mostly hacked due to the fact that most
people use the same username and password in many of their
accounts. Data such as date of birth, phone numbers,
identification number, and address can be used by perpetrators.
The cybersecurity threats are increasing day in day out, hence
there is every reason as to why various business organizations
plan and prepare (Holt et al., 2017).
Discussion
Protection of confidential information by companies must be up
to date, with the advancement of technology in this connected
world. This research will help individuals and many
organizations to thrive a lot in ensuring that the threat is
minimized through collaborating, good leadership, use of
malware scanners, firewalls, Antivirus software like Kaspersky
and other cybersecurity techniques(Brown, et al., 2015, p.46).
This paper has given investors a clear picture that cybercrime
has no perfect solution this makes them to always have a
contingency plan. Apart from causing damages and loss of vital
information cybercrime also lead to loss of life hence it is
something that should be always discouraged and those found
need to answer to their crimes effectively(Buchwald & Newell,
2019, p.215). The youths are therefore encouraged to find more
legal ways of attaining either money or any material without
using the computers (Guptaet al., 2016).
Limitation
The main limitation of the research is that today most devices
7. have turned out to be vulnerable, hence require monitoring
which at times is expensive. Every day the manufacturers strive
to be at least one step ahead of the hackers to ensure the safety
of their products since each day new devices are built (Doctoral
dissertation, Utica College). This becomes a challenge to those
who are not up to date since the technology today is moving fast
and it requires them to sell capable products to their clients.
Sadly some of the challenges show no signs of retaliation, for
example, hacking and ransomware hence each year there is a
need for a more advanced defensive machine. AL too is used by
the cybercriminals in conducting their harmful acts; hence there
is the need for one to be more cautious (Yar & Steinmentz,
2019).
Conclusion
Cybersecurity has at least helped individuals and businesses
organization secure their vital data from unauthorized people
who take advantage of it. Soon with the advancement of
technology more of it will be required as it is becoming
significant given that the world is interconnecting rapidly
(Gordon, 2018). The crimes continue to be a major threat and so
is the security that comes with every change. It is clear from the
discussion that there is no perfect solution for some of the
challenges facing cybersecurity. Instead, organizations spend a
lot to minimize those threats in the best way possible for a safe
world and future (Baig et al., 2017, p. 11).
Recommendations
The government should increase the computer-related course
and encourage more people on the need of being computer
literate in fighting cyber-crime. The youths also need to be told
on the impact of such crimes and how some even lead to loss of
life (Leon, 2015). People are required to plan and prepare
themselves same applies to the various organizations since
8. cybercrime is still there and it is advancing with the advance in
technology. Deployment of quick detectors of any intrusion for
quick data recovery, the corrupted data need to be dealt with
immediately before it is lost or destroyed. As mention earlier, is
that collaboration with other individual and sharing of breach
results helps a lot in the prevention of cyber-crimes (Guptaet
al., 2016).
Reference
Abomhara, M. (2015). Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks. Journal of Cyber
Security and Mobility, 4(1), 65-88.
Baig, Z. A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P.,
Chernyshev, M., & Syed, N. (2017). Future challenges for
smart cities: Cyber-security and digital forensics. Digital
Investigation, 22, 3-13.
Brown, S., Gommers, J., & Serrano, O. (2015, October). From
cyber security information sharing to threat management.
In Proceedings of the 2nd ACM workshop on information
sharing and collaborative security (pp. 43-49). ACM.
Buchwald, M., & Newell, S. (2019). Encouraging the Private
Sector to Report Cyber Incidents to Law Enforcement. US
Att'ys Bull., 67, 215.
Dawson, M., Eltayeb, M., & Omar, M. (Eds.). (2016). Security
solutions for hyperconnectivity and the Internet of things. IGI
Global.
Gordon, M. S. (2018). Economic and National Security Effects
of Cyber Attacks Against Small Business Communities.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.).
9. (2016). Handbook of research on modern cryptographic
solutions for computer and cyber security. IGI global.
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C.
(2017). Cybercrime and digital forensics: An introduction.
Routledge.
Khatoun, R., & Zeadally, S. (2017). Cybersecurity and privacy
solutions in smart cities. IEEE Communications
Magazine, 55(3), 51-59. (Khartoun & Zeadally, 2017, p.56)
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., &
Jones, K. (2015). A survey of cyber security management in
industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
Leon, A. D. (2015). Impacts of Malicious Cyber
Activities (Doctoral dissertation, Johns Hopkins University).
Raman, S. (2019). Our Role in Combating Global Cyber
Threats. US Att'ys Bull., 67, 3.
Sutherland, E. (2018, March). Cybersecurity: governance of a
new technology. In Proceedings of the PSA18 Political Studies
Association International Conference, Cardiff (pp. 26-28).
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June).
Security and privacy challenges in industrial internet of things.
In 2015 52nd ACM/EDAC/IEEE Design Automation Conference
(DAC) (pp. 1-6). IEEE.
Taddeo, M., & Floridi, L. (2018). Regulate artificial
intelligence to avert cyber arms race.
Yampolskiy, R. V., & Spellchecker, M. S. (2016). Artificial
intelligence safety and cybersecurity: A timeline of AI
failures. arXiv preprint arXiv:1610.07997.
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society.
SAGE Publications Limited.
Essay : The Comparison/Contrast Essay
Length: 4page
Readings:
10. Readings:
"How to Tame a Wild Tongue," Gloria Anzaldua
http://www.olypen.com/pnkdurr/as/mother_text.htm
"Mother Tongue," Amy Tan "
https://www.everettsd.org/cms/lib07/WA01920133/Centricity/D
omain/965/Anzaldua-Wild-Tongue.pdf
Only use "How to Tame a Wild Tongue," Gloria Anzaldua and
"Mother Tongue," Amy Tan."
Topic:
Topic: Please write an essay of 6 or more paragraphs in which
you compare and contrast two of the above essays. While you
my compare and contrast the authors' purpose and circumstances
for writing each essay, please avoid focusing solely on the
authors' biographical information. Use the discussion questions
below to help you generate points of comparison and contrast.
Discussion questions:
In what similar and different ways do Anzaldua and Tan give
voice to languages denied in dominant culture? How is language
related to assimilation for the authors? In their respective
writings, do they support or resist assimilation? Which authors
discuss language in terms of hybridity?
In what ways do the authors above address the issue of
marginalization?
Point to your thesis and then read your first body paragraph.
Do this for each of the paper's body paragraphs. Ask yourself:
Is the paragraph relevant to the thesis? Does it advance or prove
the thesis? Is there any information within the paragraph that
11. doesn't relate to the thesis?
This strategy can also be used within each paragraph to check
each paragraph's topic sentence and main points. Write down
your first topic sentence. Ask yourself the following: Is the
content of this paragraph relevant to the thesis? Does it advance
or prove the thesis? Is there any information within the
paragraph that doesn't relate to the thesis?
Good luck!
10/02/2019
The Comparison/contrast Essay
The works of Amy Tan and Gloria Anzaldua are not only about
using language; it is primarily about the experience of someone
who is not conveniently American. Amy Tan’s essay focuses on
how her mother communicates with the world as a Chinese
immigrant, and what impact it had on Tan’s life, language, and
writing career, while Gloria Anzaldua shares the variety of
language she possesses as a Chicana, and how it is connected
with people of the same origin. Even though the essays are
essentially different not only in the ethnicities of the authors
but also the main ideas, these two essays have a similar purpose
of explaining how valuable and variable language is and also
share themes of marginalization and assimilation, both
linguistic and cultural.
Anzaldua is a Chicana woman, whose language is influenced not
only by American culture and environment but also a variety of
Latino and Chicana groups. While she mentions that during her
time in school, she experienced a negative attitude because she
spoke Spanish, her piece primarily concerns the topic of
12. language within the community. Due to the long history of
Spanish settles, the language had a lot of opportunities to
develop and branch out according to the area, particular social
group, and other factors. Anzaldua differentiates eight
languages she speaks, describing that each language belongs to
a particular group is speaking to. The two most important points
she makes considering her language is that Chicana people “
have internalized the belief that (they) speak poor Spanish”
(Anzaldua), which developed because of the oppression, and
that they experience shame with the language they sometimes
speak even around Chicana or Latina people. She makes it clear
that a language she speaks at home - Spanglish - makes her feel
the most comfortable, even though it is sometimes oppressed
not only by non-Chicanas but also within the community.
Tan also has a special kind of language she uses at home in
order for her mom to understand her better - she calls it a
simple English. While Anzaldua describes not only the
experience of oppression outside the community but also
discusses the language that Chicana and Latino people use, Tan
focuses on her and her mother’s communication with people
who are not Chinese. Tan also has different languages she
speaks - as mentioned before, the simple English, and the
profound English that she uses with native English speakers.
There is also a third kind of language mentioned - a broken
English, that Tan’s mother uses. Tan’s important idea from the
text is that not only she but also people around her believed that
because her mother's language was limited and imperfect, her
thoughts were too. Tan argues that language shapes one’s
perception of the speaker, and people from non-dominant
cultures can suffer from it.
The theme of marginalization appears in both of the texts - in
Tan’s through her mother's experience, in Anzaldua from her
experience in school and views on her language as a poor
Spanish. Tan’s mother speaking limited English made people in
the hospital, for example, treat her less significant, and on the
other hand, made Tan be ashamed of her mother. Anzaldua went
13. through silencing when she was forbidden to use Spanish in
school during recess - the act in which the dominant group
belittles one’s culture and limits their actions. A language is an
essential tool for shaping one’s cultural identity and shifting
minds, but it can be used as a weapon of marginalization.
These two works also show how adaptive the language can be,
and they both in different ways, support assimilation.
Considering that they use language for their jobs - a writer and
a teacher - they also adapt their cultures and hybridity in
practice. Tan chooses to simplify her language in her stories,
and Anzaldua does not limit herself for only English, choosing
different languages for different groups, as well as showing her
students works of Chicana authors.
Language is used to connect with the world around, and it can
have a large influence on one’s life, especially if they use more
than one language. It influences the perception of people
around, and it shapes one’s cultural identity, as it varies a lot in
the shapes and forms it takes. For both Tan and Anzaldua, while
language has brought them some negative marginalizing
experience, it is in the first place the voice of their home,
culture, and comfort.
Works Cited
Anzaldua, Gloria. How To Tame A Wild Tongue. 1987.
Tan, Amy. Mother Tongue. 1990.