SlideShare a Scribd company logo
1 of 14
Running Head: CURRENT CHALLENGES FACING CYBER
SECURITY 1
CURRENT CHALLENGES FACING CYBER SECURITY
12
(Name of School)
(Your Name)
(Course Code)
(Instructor’s Name)
(Date)
Current Challenges Facing Cyber Security
Abstract
Modern technology has been used today in various fields and it
has proved to be of importance. Technology as a whole makes
the world appear small in terms of distance due to fast transport
and communication and a huge task to be less. Many people
have been so dependent on technology, which is advancing fast.
The technology faces quite several challenges with the main one
being cyber-crimes in different organizations and that where
cybersecurity plays its part in the protection of vital
information from being accessed or destroyed by unauthorized
individuals. Cybersecurity plays a significant role in ensuring
that any computer-related information is secure, no harm can
come to it or threat is detected early before it thrives (Raman,
2019, p.3). Despite that still, the cybersecurity faces a lot of
challenges; the main objective of this paper is to focus on those
challenges faced by cybersecurity, making it less effective in
playing its role. Also on some of the measures that have been
taken in preventing the crimes associated with computer
systems (Sutherland, 2018, p. 27).
Introduction
The world today starting from an individual moving to the
largest organizations, all at least have a computer system for
either storing information or used in day to day activities.
Human beings can communicate with their loved ones from the
far distance, they can travel long distance within the shortest
time possible, and also they make what is deemed to be less
effective, to be efficient. This is how good the technology is
and why people are obsessed with it day in day out. Before all
this, there is still the fact that they are unable to safeguard their
information mostly the private one (Sadeghi et al., 2015, p. 4).
This is why this paper is of importance as it makes one realize
that within a fraction of a second or a mini second one can lose
over a million in his bank account, millions of passwords could
be hacked, the funny part is that someone can give out your
money for donation without your knowledge, a virus can be sent
into your computer to disrupt it or malware this is mostly
associated with computers. That is how cyber-crime is and you
can imagine how the victims cope with such surprise events
when they do occur, in some cases, others take their lives in
such a situation. These may occur due to the lack of
cybersecurity that allows computer and other machines to be
exploited (Sutherland, 2018, p. 27).
Objectives
To come up with a strategy that can respond quickly from cyber
incidents and also prevent them when they occur.
To ensure that there is integrity maintained and availability of
linked systems.
Encourage the creation of cyber secured machines to fight cyber
threats.
Literature Review
This paper will give a view of the major threats to cybersecurity
and privacy protection. Introduction of One Time Password
(OTP) has also helped secure certain services in the network
like emails and other accounts (Sutherland, 2018, p. 27). The
current trend in the technology has left every solution to be put
in doubt because the cybercriminals use the same tools in
deploying their illegal tasks of hacking or spreading viruses.
Most people do not realize the power a computer holds until it
breaks down and stops functioning as usual. The machine, just
like human beings one can easily manipulate and make it do
what he or she wants to do with it despite the real owner, by
this it means that it doesn’t matter the position, location, and
ownership of the machine. This will not guarantee anyone that
their machines cannot be compromised (Dawson, 2016).
With the advancement in technology currently going on to
another level, imagine a free cybersecurity globe. The machines
and the computer invented don’t have a cyber-security in mind,
it will put the world at a greater risk given things like drone are
controlled freely in the sky, trains that use electricity, and
automated vehicles. This great efficiency which is positive for
now could turn out to be negative if cyber-crimes are not
eliminated or resolved as quickly as possible (Knowles et al.,
2015, p.75).
Artificial intelligence is created to behave more like human
beings as it detects any threat intrusion. It identifies mostly
what it has been trained to and it does the job well. This is a
tool designed to fight cybercrime. It can handle a large number
of issues and analyze them to be it organization’s emails, files
or site (Yampolskiy, 2016). It is good in the detection of
unknown threats that tend to take time to be noticed by other
software. As mentioned earlier is that some of the threat are
entertained by an ignorant individual who for instance get email
links but decide to risk clicking onto the link despite knowing
the risks. Awareness and training are required to such fellows
who risk a lot without knowing the outcomes of the threats
while at home(Taddeo & Floridi, 2018).
Cyber Security Challenges
There are different forms of cyber-crimes that include;
destruction of information, theft, blackmail, extortion,
manipulation, and services denial. The threats are mostly as a
result of tools like malware viruses, ransomware, ATM
skimmers, and spyware. Below are some of the challenges of
cybersecurity some are computer-related while others are a
result of human ignorance and lack of resources (Holt et al.,
2017).
Ransomware
This is the worst compared to other virus spread threats as it is
a malware used to force a customer or a business organization
to pay a ransom for the criminal to let go of any vital
information. It is reported that the number of the attack is still
increasing ranging now at about 37 percent. They tend to ask
for more pay since they have all the leverage (Holt et al., 2017).
The Internet of Things (Iot) Threat
This is involved with many devices that are currently in the
market and devices found at their homes. The percentage of
people with such devices that allow internet connection is also
rising at a faster rate. Due to this high connectivity, it makes
ever individually vulnerable to cyber-attacks. End users who
lack the knowledge of cyber-attacks they end up being victims
and it ends badly for them probably (Abomhara, 2015, p.81).
Data Manipulation
In this, the information is not stolen or destroyed but instead, it
is modified in a more different way making it difficult to detect
unlike with the case of data destruction. A minor alteration may
have a much bigger impact on the system functioning or the
whole grid (Leon, 2015).
Identity Theft
It focuses on the funds which are stolen using a fake identity or
rather a fraud. Most individuals are less likely to suspect such a
crime can happen on their watch they believe it when it’s
already too late when the crime has taken place. It is not
different from spyware which also involves stealing of data and
monitoring people for cybercrimes. Also Social engineering is
done by blackmailing individuals in gaining access to their data
or devices.
Lack of Leadership
As far as cybersecurity is concerned it can never be fruitful
unless the leadership of the organization is steady and
supportive. Trust is all that is required in an organization
without that then people can find themselves giving out
confidential information without knowing. Also, they need to
work closely with different sectors; through collaboration, they
can be rest assured that they can survive any harm on the way
(Brown, et al., 2015, p.46). Issues concerning cybersecurity
need to be taken more seriously by the leader to protect the
well-being of the organization. Most are vulnerable to attack
due to lack of leadership and collaboration (Guptaet al., 2016).
Training and Creating Awareness
This is typically for those who still have less knowledge of how
to handle detected threat. Through training and creating
awareness on the impacts of cyber-crimes more are enlightened
on the need to be prepared. The education sector has fewer
people who learn Information technology and this makes it
difficult to fight cyber-crime (Guptaet al., 2016).
Methods
Questionnaires were used in collecting on information from
individuals at home to people in the business organization
where the paper mainly entails the big question of the number
of occasions the cybersecurity has had encountered any threat
and the type of threat that was imminent. The data was collected
randomly in various premises to just give an insight into the
results(Gordon, 2018).
Results
Cyber-crimes have evolved with time and so are the many forms
of cyber-crimes. The worst of all was ransomware which
involved of holding of information than the cyber-criminal
requests a specific amount of money that is mostly high. Other
crimes like identity theft are hard to detect and are realized
once they have occurred. It’s clear that there are fewer people
who work with a computer system but yet have a little
knowledge of operating them or minimizing small threats that
are initiated by amateur hackers who hack for fun. Usernames
and passwords are mostly hacked due to the fact that most
people use the same username and password in many of their
accounts. Data such as date of birth, phone numbers,
identification number, and address can be used by perpetrators.
The cybersecurity threats are increasing day in day out, hence
there is every reason as to why various business organizations
plan and prepare (Holt et al., 2017).
Discussion
Protection of confidential information by companies must be up
to date, with the advancement of technology in this connected
world. This research will help individuals and many
organizations to thrive a lot in ensuring that the threat is
minimized through collaborating, good leadership, use of
malware scanners, firewalls, Antivirus software like Kaspersky
and other cybersecurity techniques(Brown, et al., 2015, p.46).
This paper has given investors a clear picture that cybercrime
has no perfect solution this makes them to always have a
contingency plan. Apart from causing damages and loss of vital
information cybercrime also lead to loss of life hence it is
something that should be always discouraged and those found
need to answer to their crimes effectively(Buchwald & Newell,
2019, p.215). The youths are therefore encouraged to find more
legal ways of attaining either money or any material without
using the computers (Guptaet al., 2016).
Limitation
The main limitation of the research is that today most devices
have turned out to be vulnerable, hence require monitoring
which at times is expensive. Every day the manufacturers strive
to be at least one step ahead of the hackers to ensure the safety
of their products since each day new devices are built (Doctoral
dissertation, Utica College). This becomes a challenge to those
who are not up to date since the technology today is moving fast
and it requires them to sell capable products to their clients.
Sadly some of the challenges show no signs of retaliation, for
example, hacking and ransomware hence each year there is a
need for a more advanced defensive machine. AL too is used by
the cybercriminals in conducting their harmful acts; hence there
is the need for one to be more cautious (Yar & Steinmentz,
2019).
Conclusion
Cybersecurity has at least helped individuals and businesses
organization secure their vital data from unauthorized people
who take advantage of it. Soon with the advancement of
technology more of it will be required as it is becoming
significant given that the world is interconnecting rapidly
(Gordon, 2018). The crimes continue to be a major threat and so
is the security that comes with every change. It is clear from the
discussion that there is no perfect solution for some of the
challenges facing cybersecurity. Instead, organizations spend a
lot to minimize those threats in the best way possible for a safe
world and future (Baig et al., 2017, p. 11).
Recommendations
The government should increase the computer-related course
and encourage more people on the need of being computer
literate in fighting cyber-crime. The youths also need to be told
on the impact of such crimes and how some even lead to loss of
life (Leon, 2015). People are required to plan and prepare
themselves same applies to the various organizations since
cybercrime is still there and it is advancing with the advance in
technology. Deployment of quick detectors of any intrusion for
quick data recovery, the corrupted data need to be dealt with
immediately before it is lost or destroyed. As mention earlier, is
that collaboration with other individual and sharing of breach
results helps a lot in the prevention of cyber-crimes (Guptaet
al., 2016).
Reference
Abomhara, M. (2015). Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks. Journal of Cyber
Security and Mobility, 4(1), 65-88.
Baig, Z. A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P.,
Chernyshev, M., & Syed, N. (2017). Future challenges for
smart cities: Cyber-security and digital forensics. Digital
Investigation, 22, 3-13.
Brown, S., Gommers, J., & Serrano, O. (2015, October). From
cyber security information sharing to threat management.
In Proceedings of the 2nd ACM workshop on information
sharing and collaborative security (pp. 43-49). ACM.
Buchwald, M., & Newell, S. (2019). Encouraging the Private
Sector to Report Cyber Incidents to Law Enforcement. US
Att'ys Bull., 67, 215.
Dawson, M., Eltayeb, M., & Omar, M. (Eds.). (2016). Security
solutions for hyperconnectivity and the Internet of things. IGI
Global.
Gordon, M. S. (2018). Economic and National Security Effects
of Cyber Attacks Against Small Business Communities.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.).
(2016). Handbook of research on modern cryptographic
solutions for computer and cyber security. IGI global.
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C.
(2017). Cybercrime and digital forensics: An introduction.
Routledge.
Khatoun, R., & Zeadally, S. (2017). Cybersecurity and privacy
solutions in smart cities. IEEE Communications
Magazine, 55(3), 51-59. (Khartoun & Zeadally, 2017, p.56)
Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., &
Jones, K. (2015). A survey of cyber security management in
industrial control systems. International journal of critical
infrastructure protection, 9, 52-80.
Leon, A. D. (2015). Impacts of Malicious Cyber
Activities (Doctoral dissertation, Johns Hopkins University).
Raman, S. (2019). Our Role in Combating Global Cyber
Threats. US Att'ys Bull., 67, 3.
Sutherland, E. (2018, March). Cybersecurity: governance of a
new technology. In Proceedings of the PSA18 Political Studies
Association International Conference, Cardiff (pp. 26-28).
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June).
Security and privacy challenges in industrial internet of things.
In 2015 52nd ACM/EDAC/IEEE Design Automation Conference
(DAC) (pp. 1-6). IEEE.
Taddeo, M., & Floridi, L. (2018). Regulate artificial
intelligence to avert cyber arms race.
Yampolskiy, R. V., & Spellchecker, M. S. (2016). Artificial
intelligence safety and cybersecurity: A timeline of AI
failures. arXiv preprint arXiv:1610.07997.
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society.
SAGE Publications Limited.
Essay : The Comparison/Contrast Essay
Length: 4page
Readings:
Readings:
"How to Tame a Wild Tongue," Gloria Anzaldua
http://www.olypen.com/pnkdurr/as/mother_text.htm
"Mother Tongue," Amy Tan "
https://www.everettsd.org/cms/lib07/WA01920133/Centricity/D
omain/965/Anzaldua-Wild-Tongue.pdf
Only use "How to Tame a Wild Tongue," Gloria Anzaldua and
"Mother Tongue," Amy Tan."
Topic:
Topic: Please write an essay of 6 or more paragraphs in which
you compare and contrast two of the above essays. While you
my compare and contrast the authors' purpose and circumstances
for writing each essay, please avoid focusing solely on the
authors' biographical information. Use the discussion questions
below to help you generate points of comparison and contrast.
Discussion questions:
In what similar and different ways do Anzaldua and Tan give
voice to languages denied in dominant culture? How is language
related to assimilation for the authors? In their respective
writings, do they support or resist assimilation? Which authors
discuss language in terms of hybridity?
In what ways do the authors above address the issue of
marginalization?
Point to your thesis and then read your first body paragraph.
Do this for each of the paper's body paragraphs. Ask yourself:
Is the paragraph relevant to the thesis? Does it advance or prove
the thesis? Is there any information within the paragraph that
doesn't relate to the thesis?
This strategy can also be used within each paragraph to check
each paragraph's topic sentence and main points. Write down
your first topic sentence. Ask yourself the following: Is the
content of this paragraph relevant to the thesis? Does it advance
or prove the thesis? Is there any information within the
paragraph that doesn't relate to the thesis?
Good luck!
10/02/2019
The Comparison/contrast Essay
The works of Amy Tan and Gloria Anzaldua are not only about
using language; it is primarily about the experience of someone
who is not conveniently American. Amy Tan’s essay focuses on
how her mother communicates with the world as a Chinese
immigrant, and what impact it had on Tan’s life, language, and
writing career, while Gloria Anzaldua shares the variety of
language she possesses as a Chicana, and how it is connected
with people of the same origin. Even though the essays are
essentially different not only in the ethnicities of the authors
but also the main ideas, these two essays have a similar purpose
of explaining how valuable and variable language is and also
share themes of marginalization and assimilation, both
linguistic and cultural.
Anzaldua is a Chicana woman, whose language is influenced not
only by American culture and environment but also a variety of
Latino and Chicana groups. While she mentions that during her
time in school, she experienced a negative attitude because she
spoke Spanish, her piece primarily concerns the topic of
language within the community. Due to the long history of
Spanish settles, the language had a lot of opportunities to
develop and branch out according to the area, particular social
group, and other factors. Anzaldua differentiates eight
languages she speaks, describing that each language belongs to
a particular group is speaking to. The two most important points
she makes considering her language is that Chicana people “
have internalized the belief that (they) speak poor Spanish”
(Anzaldua), which developed because of the oppression, and
that they experience shame with the language they sometimes
speak even around Chicana or Latina people. She makes it clear
that a language she speaks at home - Spanglish - makes her feel
the most comfortable, even though it is sometimes oppressed
not only by non-Chicanas but also within the community.
Tan also has a special kind of language she uses at home in
order for her mom to understand her better - she calls it a
simple English. While Anzaldua describes not only the
experience of oppression outside the community but also
discusses the language that Chicana and Latino people use, Tan
focuses on her and her mother’s communication with people
who are not Chinese. Tan also has different languages she
speaks - as mentioned before, the simple English, and the
profound English that she uses with native English speakers.
There is also a third kind of language mentioned - a broken
English, that Tan’s mother uses. Tan’s important idea from the
text is that not only she but also people around her believed that
because her mother's language was limited and imperfect, her
thoughts were too. Tan argues that language shapes one’s
perception of the speaker, and people from non-dominant
cultures can suffer from it.
The theme of marginalization appears in both of the texts - in
Tan’s through her mother's experience, in Anzaldua from her
experience in school and views on her language as a poor
Spanish. Tan’s mother speaking limited English made people in
the hospital, for example, treat her less significant, and on the
other hand, made Tan be ashamed of her mother. Anzaldua went
through silencing when she was forbidden to use Spanish in
school during recess - the act in which the dominant group
belittles one’s culture and limits their actions. A language is an
essential tool for shaping one’s cultural identity and shifting
minds, but it can be used as a weapon of marginalization.
These two works also show how adaptive the language can be,
and they both in different ways, support assimilation.
Considering that they use language for their jobs - a writer and
a teacher - they also adapt their cultures and hybridity in
practice. Tan chooses to simplify her language in her stories,
and Anzaldua does not limit herself for only English, choosing
different languages for different groups, as well as showing her
students works of Chicana authors.
Language is used to connect with the world around, and it can
have a large influence on one’s life, especially if they use more
than one language. It influences the perception of people
around, and it shapes one’s cultural identity, as it varies a lot in
the shapes and forms it takes. For both Tan and Anzaldua, while
language has brought them some negative marginalizing
experience, it is in the first place the voice of their home,
culture, and comfort.
Works Cited
Anzaldua, Gloria. How To Tame A Wild Tongue. 1987.
Tan, Amy. Mother Tongue. 1990.
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx

More Related Content

Similar to Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Required topic cyberlaw documentpresentation document .docx
Required topic  cyberlaw documentpresentation document .docxRequired topic  cyberlaw documentpresentation document .docx
Required topic cyberlaw documentpresentation document .docxheunice
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxdaniahendric
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
 
Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxnormanibarber20063
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloJohn Intindolo
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 

Similar to Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx (20)

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Required topic cyberlaw documentpresentation document .docx
Required topic  cyberlaw documentpresentation document .docxRequired topic  cyberlaw documentpresentation document .docx
Required topic cyberlaw documentpresentation document .docx
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
cyber crime
cyber crimecyber crime
cyber crime
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 

More from healdkathaleen

Mill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxMill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxhealdkathaleen
 
Milford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxMilford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxhealdkathaleen
 
milies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxmilies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxhealdkathaleen
 
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxMidterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxhealdkathaleen
 
Midterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxMidterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxhealdkathaleen
 
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxMichelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxhealdkathaleen
 
Michelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxMichelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxhealdkathaleen
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxhealdkathaleen
 
Milestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxMilestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxhealdkathaleen
 
MigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxMigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxhealdkathaleen
 
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxMid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxhealdkathaleen
 
MicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxMicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxhealdkathaleen
 
Michael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxMichael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxhealdkathaleen
 
Michael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxMichael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxhealdkathaleen
 
Michael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxMichael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxhealdkathaleen
 
Message Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxMessage Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxhealdkathaleen
 
Methodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxMethodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxhealdkathaleen
 
Mental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxMental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxhealdkathaleen
 
Meningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxMeningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxhealdkathaleen
 
Memoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxMemoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxhealdkathaleen
 

More from healdkathaleen (20)

Mill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docxMill proposes his Art of Life, but he also insists that it is not ve.docx
Mill proposes his Art of Life, but he also insists that it is not ve.docx
 
Milford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docxMilford Bank and Trust Company is revamping its credit management de.docx
Milford Bank and Trust Company is revamping its credit management de.docx
 
milies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docxmilies (most with teenage children) and the Baby Boomers (teens and .docx
milies (most with teenage children) and the Baby Boomers (teens and .docx
 
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docxMidterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
Midterm Paper - Recombinant DNA TechnologySome scientists are conc.docx
 
Midterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docxMidterm Study GuideAnswers need to be based on the files i will em.docx
Midterm Study GuideAnswers need to be based on the files i will em.docx
 
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docxMichelle Carroll is a coworker of yours and she overheard a conversa.docx
Michelle Carroll is a coworker of yours and she overheard a conversa.docx
 
Michelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docxMichelle is attending college and has a part-time job. Once she fini.docx
Michelle is attending college and has a part-time job. Once she fini.docx
 
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docxMidterm Assignment Instructions (due 31 August)The mid-term essay .docx
Midterm Assignment Instructions (due 31 August)The mid-term essay .docx
 
Milestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docxMilestone 2Outline of Final PaperYou will create a robust.docx
Milestone 2Outline of Final PaperYou will create a robust.docx
 
MigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docxMigrationThe human population has lived a rural lifestyle thro.docx
MigrationThe human population has lived a rural lifestyle thro.docx
 
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docxMid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
Mid-TermDismiss Mid-Term1) As you consider the challenges fa.docx
 
MicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docxMicroeconomicsUse what you have learned about economic indicators .docx
MicroeconomicsUse what you have learned about economic indicators .docx
 
Michael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docxMichael Dell began building and selling computers from his dorm room.docx
Michael Dell began building and selling computers from his dorm room.docx
 
Michael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docxMichael is a three-year-old boy with severe seizure activity. He h.docx
Michael is a three-year-old boy with severe seizure activity. He h.docx
 
Michael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docxMichael graduates from New York University and on February 1st of th.docx
Michael graduates from New York University and on February 1st of th.docx
 
Message Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docxMessage Using Multisim 11, please help me build a home security sys.docx
Message Using Multisim 11, please help me build a home security sys.docx
 
Methodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docxMethodology of H&M internationalization Research purposeRe.docx
Methodology of H&M internationalization Research purposeRe.docx
 
Mental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docxMental Disability DiscussionConsider the typification of these c.docx
Mental Disability DiscussionConsider the typification of these c.docx
 
Meningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docxMeningitis Analyze the assigned neurological disorder and prepar.docx
Meningitis Analyze the assigned neurological disorder and prepar.docx
 
Memoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docxMemoir Format(chart this)Introduction (that captures the r.docx
Memoir Format(chart this)Introduction (that captures the r.docx
 

Recently uploaded

Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 

Recently uploaded (20)

Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 

Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx

  • 1. Running Head: CURRENT CHALLENGES FACING CYBER SECURITY 1 CURRENT CHALLENGES FACING CYBER SECURITY 12 (Name of School) (Your Name) (Course Code) (Instructor’s Name) (Date) Current Challenges Facing Cyber Security Abstract Modern technology has been used today in various fields and it has proved to be of importance. Technology as a whole makes the world appear small in terms of distance due to fast transport and communication and a huge task to be less. Many people have been so dependent on technology, which is advancing fast. The technology faces quite several challenges with the main one being cyber-crimes in different organizations and that where cybersecurity plays its part in the protection of vital information from being accessed or destroyed by unauthorized individuals. Cybersecurity plays a significant role in ensuring that any computer-related information is secure, no harm can
  • 2. come to it or threat is detected early before it thrives (Raman, 2019, p.3). Despite that still, the cybersecurity faces a lot of challenges; the main objective of this paper is to focus on those challenges faced by cybersecurity, making it less effective in playing its role. Also on some of the measures that have been taken in preventing the crimes associated with computer systems (Sutherland, 2018, p. 27). Introduction The world today starting from an individual moving to the largest organizations, all at least have a computer system for either storing information or used in day to day activities. Human beings can communicate with their loved ones from the far distance, they can travel long distance within the shortest time possible, and also they make what is deemed to be less effective, to be efficient. This is how good the technology is and why people are obsessed with it day in day out. Before all this, there is still the fact that they are unable to safeguard their information mostly the private one (Sadeghi et al., 2015, p. 4). This is why this paper is of importance as it makes one realize that within a fraction of a second or a mini second one can lose over a million in his bank account, millions of passwords could be hacked, the funny part is that someone can give out your money for donation without your knowledge, a virus can be sent into your computer to disrupt it or malware this is mostly associated with computers. That is how cyber-crime is and you can imagine how the victims cope with such surprise events when they do occur, in some cases, others take their lives in such a situation. These may occur due to the lack of cybersecurity that allows computer and other machines to be exploited (Sutherland, 2018, p. 27). Objectives To come up with a strategy that can respond quickly from cyber incidents and also prevent them when they occur. To ensure that there is integrity maintained and availability of linked systems. Encourage the creation of cyber secured machines to fight cyber
  • 3. threats. Literature Review This paper will give a view of the major threats to cybersecurity and privacy protection. Introduction of One Time Password (OTP) has also helped secure certain services in the network like emails and other accounts (Sutherland, 2018, p. 27). The current trend in the technology has left every solution to be put in doubt because the cybercriminals use the same tools in deploying their illegal tasks of hacking or spreading viruses. Most people do not realize the power a computer holds until it breaks down and stops functioning as usual. The machine, just like human beings one can easily manipulate and make it do what he or she wants to do with it despite the real owner, by this it means that it doesn’t matter the position, location, and ownership of the machine. This will not guarantee anyone that their machines cannot be compromised (Dawson, 2016). With the advancement in technology currently going on to another level, imagine a free cybersecurity globe. The machines and the computer invented don’t have a cyber-security in mind, it will put the world at a greater risk given things like drone are controlled freely in the sky, trains that use electricity, and automated vehicles. This great efficiency which is positive for now could turn out to be negative if cyber-crimes are not eliminated or resolved as quickly as possible (Knowles et al., 2015, p.75). Artificial intelligence is created to behave more like human beings as it detects any threat intrusion. It identifies mostly what it has been trained to and it does the job well. This is a tool designed to fight cybercrime. It can handle a large number of issues and analyze them to be it organization’s emails, files or site (Yampolskiy, 2016). It is good in the detection of unknown threats that tend to take time to be noticed by other software. As mentioned earlier is that some of the threat are entertained by an ignorant individual who for instance get email links but decide to risk clicking onto the link despite knowing the risks. Awareness and training are required to such fellows
  • 4. who risk a lot without knowing the outcomes of the threats while at home(Taddeo & Floridi, 2018). Cyber Security Challenges There are different forms of cyber-crimes that include; destruction of information, theft, blackmail, extortion, manipulation, and services denial. The threats are mostly as a result of tools like malware viruses, ransomware, ATM skimmers, and spyware. Below are some of the challenges of cybersecurity some are computer-related while others are a result of human ignorance and lack of resources (Holt et al., 2017). Ransomware This is the worst compared to other virus spread threats as it is a malware used to force a customer or a business organization to pay a ransom for the criminal to let go of any vital information. It is reported that the number of the attack is still increasing ranging now at about 37 percent. They tend to ask for more pay since they have all the leverage (Holt et al., 2017). The Internet of Things (Iot) Threat This is involved with many devices that are currently in the market and devices found at their homes. The percentage of people with such devices that allow internet connection is also rising at a faster rate. Due to this high connectivity, it makes ever individually vulnerable to cyber-attacks. End users who lack the knowledge of cyber-attacks they end up being victims and it ends badly for them probably (Abomhara, 2015, p.81). Data Manipulation In this, the information is not stolen or destroyed but instead, it is modified in a more different way making it difficult to detect unlike with the case of data destruction. A minor alteration may have a much bigger impact on the system functioning or the whole grid (Leon, 2015). Identity Theft
  • 5. It focuses on the funds which are stolen using a fake identity or rather a fraud. Most individuals are less likely to suspect such a crime can happen on their watch they believe it when it’s already too late when the crime has taken place. It is not different from spyware which also involves stealing of data and monitoring people for cybercrimes. Also Social engineering is done by blackmailing individuals in gaining access to their data or devices. Lack of Leadership As far as cybersecurity is concerned it can never be fruitful unless the leadership of the organization is steady and supportive. Trust is all that is required in an organization without that then people can find themselves giving out confidential information without knowing. Also, they need to work closely with different sectors; through collaboration, they can be rest assured that they can survive any harm on the way (Brown, et al., 2015, p.46). Issues concerning cybersecurity need to be taken more seriously by the leader to protect the well-being of the organization. Most are vulnerable to attack due to lack of leadership and collaboration (Guptaet al., 2016). Training and Creating Awareness This is typically for those who still have less knowledge of how to handle detected threat. Through training and creating awareness on the impacts of cyber-crimes more are enlightened on the need to be prepared. The education sector has fewer people who learn Information technology and this makes it difficult to fight cyber-crime (Guptaet al., 2016). Methods Questionnaires were used in collecting on information from individuals at home to people in the business organization where the paper mainly entails the big question of the number of occasions the cybersecurity has had encountered any threat and the type of threat that was imminent. The data was collected randomly in various premises to just give an insight into the results(Gordon, 2018).
  • 6. Results Cyber-crimes have evolved with time and so are the many forms of cyber-crimes. The worst of all was ransomware which involved of holding of information than the cyber-criminal requests a specific amount of money that is mostly high. Other crimes like identity theft are hard to detect and are realized once they have occurred. It’s clear that there are fewer people who work with a computer system but yet have a little knowledge of operating them or minimizing small threats that are initiated by amateur hackers who hack for fun. Usernames and passwords are mostly hacked due to the fact that most people use the same username and password in many of their accounts. Data such as date of birth, phone numbers, identification number, and address can be used by perpetrators. The cybersecurity threats are increasing day in day out, hence there is every reason as to why various business organizations plan and prepare (Holt et al., 2017). Discussion Protection of confidential information by companies must be up to date, with the advancement of technology in this connected world. This research will help individuals and many organizations to thrive a lot in ensuring that the threat is minimized through collaborating, good leadership, use of malware scanners, firewalls, Antivirus software like Kaspersky and other cybersecurity techniques(Brown, et al., 2015, p.46). This paper has given investors a clear picture that cybercrime has no perfect solution this makes them to always have a contingency plan. Apart from causing damages and loss of vital information cybercrime also lead to loss of life hence it is something that should be always discouraged and those found need to answer to their crimes effectively(Buchwald & Newell, 2019, p.215). The youths are therefore encouraged to find more legal ways of attaining either money or any material without using the computers (Guptaet al., 2016). Limitation The main limitation of the research is that today most devices
  • 7. have turned out to be vulnerable, hence require monitoring which at times is expensive. Every day the manufacturers strive to be at least one step ahead of the hackers to ensure the safety of their products since each day new devices are built (Doctoral dissertation, Utica College). This becomes a challenge to those who are not up to date since the technology today is moving fast and it requires them to sell capable products to their clients. Sadly some of the challenges show no signs of retaliation, for example, hacking and ransomware hence each year there is a need for a more advanced defensive machine. AL too is used by the cybercriminals in conducting their harmful acts; hence there is the need for one to be more cautious (Yar & Steinmentz, 2019). Conclusion Cybersecurity has at least helped individuals and businesses organization secure their vital data from unauthorized people who take advantage of it. Soon with the advancement of technology more of it will be required as it is becoming significant given that the world is interconnecting rapidly (Gordon, 2018). The crimes continue to be a major threat and so is the security that comes with every change. It is clear from the discussion that there is no perfect solution for some of the challenges facing cybersecurity. Instead, organizations spend a lot to minimize those threats in the best way possible for a safe world and future (Baig et al., 2017, p. 11). Recommendations The government should increase the computer-related course and encourage more people on the need of being computer literate in fighting cyber-crime. The youths also need to be told on the impact of such crimes and how some even lead to loss of life (Leon, 2015). People are required to plan and prepare themselves same applies to the various organizations since
  • 8. cybercrime is still there and it is advancing with the advance in technology. Deployment of quick detectors of any intrusion for quick data recovery, the corrupted data need to be dealt with immediately before it is lost or destroyed. As mention earlier, is that collaboration with other individual and sharing of breach results helps a lot in the prevention of cyber-crimes (Guptaet al., 2016). Reference Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88. Baig, Z. A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., & Syed, N. (2017). Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation, 22, 3-13. Brown, S., Gommers, J., & Serrano, O. (2015, October). From cyber security information sharing to threat management. In Proceedings of the 2nd ACM workshop on information sharing and collaborative security (pp. 43-49). ACM. Buchwald, M., & Newell, S. (2019). Encouraging the Private Sector to Report Cyber Incidents to Law Enforcement. US Att'ys Bull., 67, 215. Dawson, M., Eltayeb, M., & Omar, M. (Eds.). (2016). Security solutions for hyperconnectivity and the Internet of things. IGI Global. Gordon, M. S. (2018). Economic and National Security Effects of Cyber Attacks Against Small Business Communities. Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.).
  • 9. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global. Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2017). Cybercrime and digital forensics: An introduction. Routledge. Khatoun, R., & Zeadally, S. (2017). Cybersecurity and privacy solutions in smart cities. IEEE Communications Magazine, 55(3), 51-59. (Khartoun & Zeadally, 2017, p.56) Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, 52-80. Leon, A. D. (2015). Impacts of Malicious Cyber Activities (Doctoral dissertation, Johns Hopkins University). Raman, S. (2019). Our Role in Combating Global Cyber Threats. US Att'ys Bull., 67, 3. Sutherland, E. (2018, March). Cybersecurity: governance of a new technology. In Proceedings of the PSA18 Political Studies Association International Conference, Cardiff (pp. 26-28). Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in industrial internet of things. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) (pp. 1-6). IEEE. Taddeo, M., & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms race. Yampolskiy, R. V., & Spellchecker, M. S. (2016). Artificial intelligence safety and cybersecurity: A timeline of AI failures. arXiv preprint arXiv:1610.07997. Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society. SAGE Publications Limited. Essay : The Comparison/Contrast Essay Length: 4page Readings:
  • 10. Readings: "How to Tame a Wild Tongue," Gloria Anzaldua http://www.olypen.com/pnkdurr/as/mother_text.htm "Mother Tongue," Amy Tan " https://www.everettsd.org/cms/lib07/WA01920133/Centricity/D omain/965/Anzaldua-Wild-Tongue.pdf Only use "How to Tame a Wild Tongue," Gloria Anzaldua and "Mother Tongue," Amy Tan." Topic: Topic: Please write an essay of 6 or more paragraphs in which you compare and contrast two of the above essays. While you my compare and contrast the authors' purpose and circumstances for writing each essay, please avoid focusing solely on the authors' biographical information. Use the discussion questions below to help you generate points of comparison and contrast. Discussion questions: In what similar and different ways do Anzaldua and Tan give voice to languages denied in dominant culture? How is language related to assimilation for the authors? In their respective writings, do they support or resist assimilation? Which authors discuss language in terms of hybridity? In what ways do the authors above address the issue of marginalization? Point to your thesis and then read your first body paragraph. Do this for each of the paper's body paragraphs. Ask yourself: Is the paragraph relevant to the thesis? Does it advance or prove the thesis? Is there any information within the paragraph that
  • 11. doesn't relate to the thesis? This strategy can also be used within each paragraph to check each paragraph's topic sentence and main points. Write down your first topic sentence. Ask yourself the following: Is the content of this paragraph relevant to the thesis? Does it advance or prove the thesis? Is there any information within the paragraph that doesn't relate to the thesis? Good luck! 10/02/2019 The Comparison/contrast Essay The works of Amy Tan and Gloria Anzaldua are not only about using language; it is primarily about the experience of someone who is not conveniently American. Amy Tan’s essay focuses on how her mother communicates with the world as a Chinese immigrant, and what impact it had on Tan’s life, language, and writing career, while Gloria Anzaldua shares the variety of language she possesses as a Chicana, and how it is connected with people of the same origin. Even though the essays are essentially different not only in the ethnicities of the authors but also the main ideas, these two essays have a similar purpose of explaining how valuable and variable language is and also share themes of marginalization and assimilation, both linguistic and cultural. Anzaldua is a Chicana woman, whose language is influenced not only by American culture and environment but also a variety of Latino and Chicana groups. While she mentions that during her time in school, she experienced a negative attitude because she spoke Spanish, her piece primarily concerns the topic of
  • 12. language within the community. Due to the long history of Spanish settles, the language had a lot of opportunities to develop and branch out according to the area, particular social group, and other factors. Anzaldua differentiates eight languages she speaks, describing that each language belongs to a particular group is speaking to. The two most important points she makes considering her language is that Chicana people “ have internalized the belief that (they) speak poor Spanish” (Anzaldua), which developed because of the oppression, and that they experience shame with the language they sometimes speak even around Chicana or Latina people. She makes it clear that a language she speaks at home - Spanglish - makes her feel the most comfortable, even though it is sometimes oppressed not only by non-Chicanas but also within the community. Tan also has a special kind of language she uses at home in order for her mom to understand her better - she calls it a simple English. While Anzaldua describes not only the experience of oppression outside the community but also discusses the language that Chicana and Latino people use, Tan focuses on her and her mother’s communication with people who are not Chinese. Tan also has different languages she speaks - as mentioned before, the simple English, and the profound English that she uses with native English speakers. There is also a third kind of language mentioned - a broken English, that Tan’s mother uses. Tan’s important idea from the text is that not only she but also people around her believed that because her mother's language was limited and imperfect, her thoughts were too. Tan argues that language shapes one’s perception of the speaker, and people from non-dominant cultures can suffer from it. The theme of marginalization appears in both of the texts - in Tan’s through her mother's experience, in Anzaldua from her experience in school and views on her language as a poor Spanish. Tan’s mother speaking limited English made people in the hospital, for example, treat her less significant, and on the other hand, made Tan be ashamed of her mother. Anzaldua went
  • 13. through silencing when she was forbidden to use Spanish in school during recess - the act in which the dominant group belittles one’s culture and limits their actions. A language is an essential tool for shaping one’s cultural identity and shifting minds, but it can be used as a weapon of marginalization. These two works also show how adaptive the language can be, and they both in different ways, support assimilation. Considering that they use language for their jobs - a writer and a teacher - they also adapt their cultures and hybridity in practice. Tan chooses to simplify her language in her stories, and Anzaldua does not limit herself for only English, choosing different languages for different groups, as well as showing her students works of Chicana authors. Language is used to connect with the world around, and it can have a large influence on one’s life, especially if they use more than one language. It influences the perception of people around, and it shapes one’s cultural identity, as it varies a lot in the shapes and forms it takes. For both Tan and Anzaldua, while language has brought them some negative marginalizing experience, it is in the first place the voice of their home, culture, and comfort. Works Cited Anzaldua, Gloria. How To Tame A Wild Tongue. 1987. Tan, Amy. Mother Tongue. 1990.