The world has registered various developments over time. The most notable development has however been computerization. Almost all aspects of the economy today use computers in one way or the other. The development in the use of the computers has also come along with the internet. The interned as a factor has independently been the best form of computerization as through it computerization has been made possible. Byres and Lowe (2014, p 215) say that the intensive use of the computer and the internet combined has been a common factor in most organizations and aspects of life in the world today. Like any other features of the economy, the use of the internet and computers has led to instances of insecurity that is commonly referred to as cyber security. Cyber security is therefore the various precautions taken to protect the information stored in the internet and the organization entirely according to Zammit (2013). Therefore, this discussion is a summary of the ways in which cyber security would be attained effectively.
In information technology, there are many steps that have been put in place to ensure that the information is protected and can only be accessed by the people authorized to have the information. The internet has been realized to pose various dangers to the security and privacy of the information within it. There have been cases where such information has been exposed to competing organizations and other unwanted destinations. Cyber security is subdivided into two sections; the first form of the cyber security involves the threats to destroy the information within the system while in the other form the cyber security might be in the form of illegal access to the information that does not necessarily intend to interfere with the information. However, in both cases, the information is under threat of destruction from the malicious threats from competing organizations or any other sources as mentioned by Ericsson (2016, p 1504). The illegal access of information belonging for another organization through the internet might be a perfect definition of cyber security.
The internet as it is today is protected through various means provided that the information is safe within the internet. There are personal regulatory measures taken to protect the information, the protection techniques and mechanisms, the national internet protection measures and in some cases there are instances of global measures all targeted at protecting the information within the internet from exploitation. The private measures are some of the personal strategies incorporated into the internet by the bearer of the information to prevent the information from any instances of exploitation through the internet as stated by Teixeira, Amin, Sandberg, Johansson, and Sastry (2014, p 5995). There are various measures taken in such cases all intended to secure the information as much as possible. The private information security measures have been encouraged by information and internet professions as it has been the most effective measure of all the available security protection measures.
The social media is one of the most commonly used internet sites in the world today. The social media exists in various forms that are known to almost every person in the world today. It is possible for the social media sites to pose certain threats to information within the system. Cyber security instances have been reported from the social media hence it would be helpful to put in place various measures that would control the instances of cyber security as presented by Liu, Xiao, Li, Liang and Chen (2012, 992). Cloud computing is also one of the cyber security instances from the social media networking. The availability of the network for the social media which is the factor that controls it is determinant in ensuring that the information is leaked. The system should therefore be protected through all possible means as a way of ensuring that the information from various sources are not cheaply available to the social media sources.
The commercial centre structures are certain modern techniques used in the modern sector to protect various forms of information from exploitation by other outside sources. The technique is best suitable for protecting information within modern devices used in the commercial activities mostly. The system has been helpful in securing information as mentioned by the various researchers who have tested the system. As stated by Yan, Qian, Sharif and Tipper (2012, p 1007), the IDS is also a system that has improved the protection of information within the internet. The system is designed in such a manner that it is capable of detecting any strange instances of insecurity within the system of any organization. These two systems are made in such a way that they would detect any instances of cyber insecurity and provide certain relevant solutions to the various problems experienced from the systems based on the reasons provided by Von Solms and Van Niekerk (2013, 99). There are many other techniques that have been designed to protect the system fully from any instances of insecurity.
Cyber security is one of the greatest problems that the digital world is faced with. The loss of information through the internet as it is has been a major problem because most people use the internet without considering the various possible problems that are present within the internet. Since cyber security has developed into a common problem, certain measures have been put in place to ensure that the information is secure. Davis, Tate, Okhravi, Grier, Overbye and Nicol (2016), mentions that there are both private and governmental measures put in place to protect various types of information from being exploited by the various applications and hacking systems that are available from the internet. Other measurements have also been put in place but it has been a common practice to protect the information from attack rather than securing it once it has been attacked or exploited.
From the study of cyber security and the literature review provided above, it is possible to note certain research problems that when handled would ensure that the research is improved in future. One of the greatest problems is that cyber security, which is the topic of discussion, is one area of the economy that continually registers certain developments. The developments in the system make it difficult to solve the problems within the study. Once a problem is identified, there are high chances that it would complicate or develop into another problem before its solution is identified according to Ralston, Graham and Hieb (2017, p 586). His is one of the challenges that the study has faced over time. Technology in the world today is one aspect that is under continued development hence it becomes difficult for a researcher to make a stable conclusion on any aspect of things related to the technological developments.
Despite the problems that the system faces, there are chances that the study would be improved in future because of the opportunities shown by literature reviewed on the matter. Some of the opportunities is the availability of the modernized gadgets like the iPhone and others that enable automatic adjustments of the data protection of various systems. The systems as produced by most companies today are capable of detecting any unwanted instances within the system and protect the system from data loss. The continued developments realized within the security measures also provide the system with opportunities to solve the cyber security problem as shown by this study based on the reasons provided by Wang and Lu (2013, p 1364). There are other opportunities for the study based on the developments in technology that influences almost all the aspects of the world. There are high chances that the developments would be experienced in cyber security as well hence making it a better field to consider in the future with improved data security.
Based on the study, there are several hypotheses possible for consideration as it is a research that is sensitive to human life as most activities today are based on the use of the internet and computers among other technological appliances of the world as used today. Zammit (2013) insists that one of the common hypotheses is that in the end of the activity, a reliable protection for the internet would be formulated to protect the information within the internet from any forms of exploitation. Another hypothesis is that, the instances of cyber insecurity will continue intensifying because as the world develops in technology, all things get improved hence cyber insecurity would also intensify. The other hypothesis would be that if no proper care is taken, cyber security as a common problem in the world would intensify and all things that need protection and privacy would be highly exposed.
Conclusion
Cyber security has for some time been a common problem for the world entirely, the literature discussed in this case however, shows the various steps that have been put in place to control the threatening situation. The discussion extends beyond analyzing the study by identifying the problems within the study and highlighting the possible opportunities it has in addition to the hypothesis relevant to the study. The study has been presented in a critical manner that proves the necessity of the study and the future of cyber security as an important factor in the world today. Cyber security as one of the greatest internet problems could only develop into a serious problem if proper precautionary measures are not taken.
List of References
Davis, C.M., Tate, J.E., Okhravi, H., Grier, C., Overbye, T.J. and Nicol, D., 2016, September. SCADA cyber security testbed development. In Power Symposium, 2006. NAPS 2006. 38th North American (pp. 483-488). IEEE.
Ericsson, G.N., 2016. Cyber security and power system communication—essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), pp.1501-1507.
Hansen, L. and Nissenbaum, H., 2017. Digital disaster, cyber security, and the Copenhagen School. International studies quarterly, 53(4), pp.1155-1175.
Liu, J., Xiao, Y., Li, S., Liang, W. and Chen, C.P., 2012. Cyber security and privacy issues in smart grids. IEEE Communications Surveys & Tutorials, 14(4), pp.981-997.
Ralston, P.A., Graham, J.H. and Hieb, J.L., 2017. Cyber security risk assessment for SCADA and DCS networks. ISA transactions, 46(4), pp.583-594.
Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H. and Sastry, S.S., 2014, December. Cyber security analysis of state estimators in electric power systems. In Decision and Control (CDC), 2010 49th IEEE Conference on (pp. 5991-5998). IEEE.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. Computers & Security, 38, pp.97-102.
Wang, W. and Lu, Z., 2013. Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), pp.1344-1371.
Yan, Y., Qian, Y., Sharif, H. and Tipper, D., 2012. A Survey on Cyber Security for Smart Grid Communications. IEEE Communications Surveys and tutorials, 14(4), pp.998-1010.
Zammit, A., 2013. National cyber security framework manual.
Cleveland, F.M., 2013, July. Cyber security issues for advanced metering infrasttructure (AMI). In Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, 2008 IEEE (pp. 1-5). IEEE.
Byres, E. and Lowe, J., 2014, October. The myths and facts behind cyber security risks for industrial control systems. In Proceedings of the VDE Kongress (Vol. 116, pp. 213-218).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download