1-)CyberSecurity Challenges (100words)
In this video the presenter discusses topics on private information, public behavior, communicative content, system architecture security, the use and the misuse of the Internet, cybersecurity challenges, control of data, metadata and so on. The video was very interesting and informative. It was an eye opener because the presenter points out how the Internet has changed the access to Information. The concepts learned from this video are privacy, public behavior, communicative content and the Internet (Imperial College London, 2012, Oct 23).
The presenter refers to privacy as the individual being able to control access to his or her information. He also indicates that once the individual’s device is connected to the Internet there is a possibility that the individual’s information is open and can be exposed to security incidents. Therefore it is important for the user to take important steps to protect public access to his or her private information (Imperial College London, 2012, Oct 23).
The presenter pointed how the Internet has changed people’s behavior in remembering people’s information. He explained this concept by comparing people’s behavior of seeing things during the time of no Internet to the modern age with access to Internet. In the time when people had limited capabilities to access the Internet people would see something and may discuss it with someone and then forget about it. But in the modern age it is difficult to forget an incident because of the availability of devices that allow photographing, recording and uploading something of their interest for the public to view (Imperial College London, 2012, Oct 23).
According to the presenter communicative content is the use of Internet by systems and organizations to conduct daily operations. He further explained this concept by saying that the use of the Internet is not just limited to seeing and writing information but also to run critical operations. Critical operations include but are not limited to control systems, electric grids, transportation, communications, and energy (Imperial College London, 2012, Oct 23).
He refers to the Internet as a connection of devices that store and transfer information across multiple networks. In addition, it was created in the intention the users were trusted and were familiar with each other. Therefore security was not taken into consideration because the focus was on efficiency, clarity, speed and no errors. However the Internet was misused by many users to conduct attacks to destroy reputation, for personal profit, cause harm to critical infrastructure and/ or take revenge (Imperial College London, 2012, Oct 23).
In this video, the presenter pointed many issues of cybersecurity without using technical terminology. The comparison between the different periods of times helped to understand the importance of cybersecurity as well as the use and misuse of the Internet. The video was also useful in understanding how technological advancements have made it difficult for individuals to keep their information private.
In the shared video for the assignment, guest speaker Chertoff had discussed many things related to cybersecurity like privacy of data, copyrights, cyber war, secure architecture of a system, data analytics to track activities inside the organization and so on. Here, I will be discussing about cybersecurity, copyright and cyber war.
Cybersecurity provides a security to software, hardware and data of IT infrastructure from cyberattacks. It is expected to have 100% cyber security to the IT infrastructure from inside and outside attacks. But, continuous developments in the cyberattacks, it is challenging to keep safe all the time. So, the biggest challenges to IT team are to develop cyber security technologies in much advance compare to cyberattacks developments so that team can provide much better security to the IT infrastructure. (Chertoff, 2012).
In the old time, keeping privacy of data was quite easy. At that time, information assets used to be in a physical format which either be placed in office or home premises. But, nowadays most of the data is available in the digital format shared easily on cloud servers or private IT infrastructure. Attackers can hack digital data without breaking physical boundaries of premises using internets. Example, photographers who take photo has rights to protect from the others without his permission. But, due to a digital format of the images, it is easily copied by anyone and shared over another flatforms. There, copyrights help to protect private data to be accessed from the unauthorized access. (Chertoff, 2012).
Before 20 years, nation needs to protect from physical threats which used to be achieved by having physical security personnel. But, from the last few decades, one country can attack another country through the internet by distrusting vital computer systems through the internet. So, it is much needed to have strong cyber security in place along with strong cyber laws. Just imagine if attackers attack the banking systems, traffic signaling system, stock exchange etc., such attacks will disrupt the any country’s IT infrastructure from outside the country. (Chertoff, 2012).
In this way, the speaker raised many questions to protect IT infrastructures from different threats.
3-)Securing the Architecture:(100words)
Security of architecture incorporates, building portrayal and the situation of security usefulness including security controls. Security of architecture can take on numerous structures relying upon the specific circumstance, to incorporate venture or framework architecture. For the motivations behind this, the term design refers to an individual data framework, which could conceivably be a piece of a bigger enterprise framework with its very own architecture which is a significant guideline for a legal and ethical approach (Chertoff, 2012).
Theft of Intellectual Property that Integrates with the Global Trading System:
Intellectual property and trade secret theft build each year. However what actions are organizations taking to ensure their IP and do they know where it is going? Numerous organizations think they have refined measures set up for securing their licensed innovation through information get to. These might be as passwords, biometrics, document encryption, non-exposure understandings, firewalls, against toxicity, interruption aversion, and worker preparing. Most of the organizations have no clue where their protected originality is accurately going (Chertoff, 2012).
Rise of Activism Ideologically Motivated Activists:
It is a source of new attacks on all kinds of enterprises can be the governments or private enterprises. It is also observed as a negative or hostile to any framework such as WikiLeaks PayPal which was not ready to process any transaction and therefore it with other banks were attacked. This is an attempt to use as theft of confidential and private documents and the interference of the systems and attempt cyberspace to use to punish who disagrees with (Chertoff, 2012).
Why Work with CheggAnswers
At CheggAnswers.com, we boast of our quick turnaround that is facilitated by our experienced team of writers. We can handle both short and long deadlines, as per our clients’ requests. Quality work is the cornerstone of our service.
Our writers are qualified professionals who are well-versed with more than 80 subjects. We have achieved this milestone overtime because of our rigorous hiring process that filters professionals from average writers. We believe that exposing our customers to qualified writers is the starting point of delivering quality work.
Our writers submit papers that are written from scratch to uphold the much-needed originality when submitting your papers. Our references are mainly sourced from reputable databases such as Emerald Insight, Ebsco, and ProQuest. All papers follow the conventional styles of referencing that include APA, MLA, Chicago, Harvard, and Vancouver.
24/7 Customer Support
The customer is king and as such, CheggAnswers.com has a committed support department that handles all concerns and clarifications from our clients. We encourage customers to contact us at any given time through our listed telephone, email, and text platforms.
Prompt Delivery & 100% Money Back Guarantee
Your work starts immediately after placing an order. Our writers are aware of our company policy that guarantees quality work to all our customers. For this reason, CheggAnswers strives to deliver assignments on time to avoid any delays that might compromise our relationship with clients.
Although we are confident in our writers, you are entitled to free revisions whenever need arises. However, we highly disregard customers who misuse this privilege.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
We offer a wide range of services that are aligned with the customers’ needs and expectations. We have positioned ourselves strategically to become a one-stop-shop where customers can access all academic services under one roof.
Our main service is academic paper writing, which is handled by a pool of experienced writers who uphold the expected standards of writing. Over the years, we have delivered quality work to our clients because of our commitment to promote quality over quantity.
Whether you are about to Join College or you are a continuing student, CheggAnswers is there to help. Our competent professionals will solve all your writing problems. Personalization is key to scoring highly and satisfying the admission board’s expectations. We will help you achieve your academic goals.
Editing & Proofreading
Some of our clients prefer to write their essays and have a third-party like CheggAnswers proofread their work. We have a skilled team of editors who comb through your paper and make any amends to increase its overall appeal. For all your editing and proofreading needs, CheggAnswers is there to help.
At CheggAnswers, we offer an extensive revision support that works tirelessly to ensure that customer needs and expectations are met. We work closely with writers upon a customer’s revision request to ensure that we keep our promise of delivering quality work to all our clients.