Computer Sciences and Information Technology
Topic:
Cyber Security
Type of work:
Essay 3 page paper
APA format
Please do not use books, blogs, or editorials
Scholarly articles that must be able to verify
No references older than 4 years
Cybersecurity
Cybersecurity is ranked as the fastest-growing infrastructure in the cyberspace globally. With the increase in internet dependency, so does the need for more advanced cybersecurity techniques to mitigate the vulnerabilities associated with technological advancement. Cybersecurity entails protecting data, programs, and networks from unauthorized access that could result in damage or distortion. Cyber-attacks become more sophisticated; thus, every nation is highly dependent on safe, stable, and resilient cyberspace to maintain its economic vitality (Kosseff, 2017). The increase in vulnerabilities, policies, and laws are being enacted to protect cyberinfrastructure. In the united states, the Cybersecurity and Infrastructure Security Agency Act of 2018 was recently enacted by the president, its imperative role is to protect the nation by making it ready and equipped with essential incident response tactics to respond to any potential threats and impending attacks if any.
Cybersecurity plays an imperative role in protecting government agencies’ sensitive information, corporate institutions, and even individual information, including intellectual property, financial data, personal information, or other highly classified intellectual property from accesses by unauthorized individuals. Since these institutions store unprecedented amounts of data, they are likely to be highly susceptible to cyber threats and attacks. These institutions are highly dependent on the use of technology to conduct their day-to-day operations, making them more vulnerable and highly exposed. These attacks are conducted by an individual or a syndicate who exploit hardware and software weakness through different modes of attacks (Geluvaraj, 2019).
There are several forms of cyber threats and attacks; however, the most common ones include malware, which entails the computer disruption that commonly occurs in forms of codes or scripts that are hinder the operations of a system by introducing viruses or worms. Another common form of cybersecurity threat includes DDDOS attacks; this form of attack affects the website or systems, barring legitimate users from access the system or network. It causes downtimes, thus making it unavailable or intended users. These forms of attacks have cost the government agencies of highly classified secrets and corporates of millions of dollars lost to these fraudulent individuals. Moreover, the increase in economic fraud is a significant concern relating to cybersecurity; for essence, cryptocurrency is becoming the most common form of economic fraud (Scala, 2019).
Fundamentally, as the attack and threat become more sophisticated, the industry is designing more methods to combat these vulnerabilities. It is imperative to identify these risks entailing the cybersecurity and plan to prevent these potential risks. The current cybersecurity mitigation mechanism includes the regular update of software and operating systems whereby organizations adopt the latest security features to combat security vulnerabilities. Secondly, the use of using anti-virus software to detect and remove threats. Additionally, the use of strong passwords that are not easy to crack. It is also essential to create awareness advising used to refrain from open email attachments from unknown sources to avoid introducing malware into their systems (Kosseff, 2017).
The future of cybersecurity is had to foresee due to the constant evolution and sophistication of attacks’ nature. However, one thing for sure, the number of attacks will increase. This is evidence by the rate at which cybersecurity threats are increasing. With the increase in information technology dependency, the future of cybersecurity is tightly integrated with more advancements. Consequently, this will increase more complexities and vulnerability; therefore, there will be more complex methods to combat cybersecurity threats (Geluvaraj, 2019). Therefore, the future of cybersecurity will be more complicated and smarter, with a possibility of applying artificial intelligence; hence the systems will be able to update themselves at a swift pace autonomically. Moreover, machine learning, supercomputing, and adaptive networks will come in handy to mitigate the impending cybersecurity threats. The evolving cognitive technologies will help improve cybersecurity and evade malicious threats.
Conclusion
Due to the increase in internet penetration today, cybersecurity is ranked as the most significant necessity to protect national security. It does not only affect individuals but also government agencies. Therefore, everyone must understand the importance of cybersecurity as anyone is susceptible to these attacks. An individual can take the protection and precautionary measures through regular system update and network security settings to expose any abnormal activities to the primary basis. Additionally, proper anti-virus on networks and system will secure the data and other digital assets to remain malware and virus free.
References
Geluvaraj, B., Satwik, P. M., & Kumar, T. A. (2019). The future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace. In International Conference on Computer Networks and Communication Technologies (pp. 739-747). Springer, Singapore.
Kosseff, J. (2017). Defining cybersecurity law. Iowa L. Rev., 103, 985.
Maisel, W. H., Paulsen, J. E., Hazelett, M. B., & Selzman, K. A. (2018). Striking the right balance when addressing cybersecurity vulnerabilities. Heart rhythm, 15(7), e69-e70.
Scala, N. M., Reilly, A. C., Goethals, P. L., & Cukier, M. (2019). Risk and the Five Hard Problems of Cybersecurity. Risk Analysis, 39(10), 2119-2126.