AllFreePapers.com - All Free Papers and Essays for All Students
Search

Cyber Security and Infrastructure - What Do They Have in Common?

Autor:   •  January 24, 2018  •  Research Paper  •  936 Words (4 Pages)  •  578 Views

Page 1 of 4

Cyber Security and Infrastructure                                                

Name

Institution

Date

Cyber Security and Infrastructure                                                

What do they have in common?

               To begin, the authors have mutually talked about cyber security and infrastructure. Clement and others have talked about cyber warfare as one of the threats to cyber security. The scholars have stated that cyber warfare is defined as any virtual conflict that may be initiated by political forces. In most cases, the motive of the attack is directed at the enemy’s computer and information systems. The attack is also perpetrated using the Internet. The attackers disable both financial and organizational systems of the enemy by stealing and altering classified data. The attack undermines networks and services. On the other hand, the other scholars have defined cyber warfare as the internet based conflict that involves politically initiated attacks on the information and information systems. The cyber warfare infiltrates the official websites and networks. They steal classified information and demand ransom. According to the authors, a good example of cyber warfare is when a country may wage cyber-attacks on another despite the resources. The writers also acknowledge that Non-governmental organizations can also initiate cyber-attacks on each other.  Notwithstanding, the authors in their articles have stated that cyber warfare attacks may be self-orchestrated. According to them, organizations may decide to attack their systems to identify the vulnerabilities so that protective mechanisms could be applied.

Different assessments of cybersecurity and critical infrastructure protection?

                Overall, the big difference between the scholars is that both have different views when it comes to cybersecurity and infrastructure protection. For instance, they argue that cyber security and infrastructure do not work together. Nevertheless, cyber safety and infrastructure protection go hand in hand. Even so, there is a need for them to be managed differently. The different emergencies would also dictate how the emergency management team would react. For instance, if there is a malware that is infecting the computers with corrupt files, evacuating the staff is not the best response (Clement, et al.). In fact, that is not necessary. Instead, there is a need to activate the incident response personnel who deals with cyber threats. The team of reply might also work as directed by the incident response plan. The staff at the crisis control centers may benefit from the collaborative interaction that would improve information sharing and communications. In most cases, that would be ideal during the pre-event and event resolution phases of the life cycles. Typically, risk management is one of the keys to preventing any forms of infiltrations. It works on the two, cyber security and infrastructure security. The three scholars have failed to highlight that cyber security is affected by the threats more than the infrastructure. Over the years, cyber threats have kept on growing. The cyber security departments keep on identifying new vulnerabilities each day. Nowadays, the infrastructure is moving to the cloud. The three authors have also failed to address the issues of cloud computing. Each one of them has given their views of cloud computing. For example, Clement 2013 suggests that the government should utilize cloud computing and they should use up to date systems to secure the critical networks.

...

Download as:   txt (5.3 Kb)   pdf (101.3 Kb)   docx (11.2 Kb)  
Continue for 3 more pages »