Tuesday, June 18, 2019

OLINE SECURITY Essay Example | Topics and Well Written Essays - 2500 words

OLINE SECURITY - Essay ExampleHigh intensity of network attacks has pushed organizations to invest in more secure systems that can resist external attacks and limit access of organization resources. However, cybercriminals use a broad range of techniques to attack networks including use of Trojan programs, fishing mails, and indirect attacks. Although various approaches to batten online security are available, there is evidence that cybercrime is still a challenge that information systems exhaust to address.A close analysis of the problem of cybercrime shows that the problem has pass away severe and needs immediate remedy. For instance, in the UK, the banking welkin loses approximately 1 billion to cybercrime and customer trust is at stake in this sector (Barclays, 2013). The banking sector is a major contributor to the economy of the country contributing about 8% of the UK Gross Domestic Product, but now falls under with child(p) threat from cybercriminals. According to United States Department of Crime and Justice, (2013) about 5 million Americans are hacked every year and their identity information is used and at least $50 million dollars is deep in thought(p) to cyber-criminals. In China, Anderson reports that in China, over 700,000 web users fall victim of cybercrime every without their knowledge and over $874 million is lost to fraudsters. Despite the imperative efforts that have been engaged to tackle the problem, cybercrime continues to be a big problem in many countries. The 2013 cybercrime report presented by Sophos new cyber threats have brought new trends in online business. This report directs that Blackhole is a new malware that has heightened the problem of cybercrime. Surprisingly, US host over 30% of the Blackhole sites while China hosts over 5% of these sites. These trends indicate that there is a need for stricter policies to curb cybercrime in the business market.Hackers are people who exploit weaknesses within computer

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.