Cyber Security Sources for your Essay

Looking Into Cyber Security


Therefore, when breaches in security take place, they are most likely to bring about significant damage and loss. Therefore, the network administrator will not be deemed accountable for abuses and breaches in the network (Stallings and Brown, 2012)

Looking Into Cyber Security


12. Self-control and restraint is to be used at all times (Weckert and Lucas, 2013)

Looking Into Cyber Security


One of the most notable cyber-attacks occurred in July 2014, and involved a massive regional banking network that was compromised by unidentified third party, which placed the accounts of over 72, 000 customers at huge risks of exposure. Investigations carried out showed that the unidentified third party could have accessed customer information, such as names, account numbers, addresses, personal identification numbers and account balances (Cordle, 2014)

Looking Into Cyber Security


One unique type of cyber-attack that reduces the effectiveness of monitoring and maintaining adequate protocols for cyber security is that an attack can sometimes come from traditional methods that utilize a process or network system vulnerability that is not quite obvious or evident to an institution. This was the situation when a well-publicized mobile payment policy was revealed and cybercriminals adopted a technique employing identity theft, instead of hacking into the payment scheme, to utilize the sign-up process of the customer to authenticate credit cards to be used on the new payment scheme (Crossman, 2015)

Looking Into Cyber Security


Looking out for breach-related expenditure in these firms' quarterly financial reports, Dean found out that the real expenses these firms reported were less than 1% of the annual revenues of each of the companies. After reimbursement from insurance and minus tax deductions, the losses become even less (Dean, 2015)

Looking Into Cyber Security


As a result of the technique employed for carrying out the cyber-attack, the attack was not detected for nearly 2 months before the bank uncovered the attack and made moves to shutdown access points of more than 90 servers. The bank collaborated with crime detectives and banking regulators, with the aim of uncovering the technique used in the attack, and made sure they addressed issues concerning the vulnerability of network systems (Glazer, 2014)

Looking Into Cyber Security


They also use banks as a means of reaching other targets. For instance, a hacked email account at a bank gives hackers the avenue to ride on the trust they enjoy from its loyal customers to contact their retail and business customers (Korolov, 2015)

Looking Into Cyber Security


To minimize the efficiency of these attacks, banks have devised improved communication and educational tools for customers, and ways for quick intervention in the case of an attack. However, apart from creating harmful software created to hack online bank details, criminals have found ways to subvert the software and servers owned by prestigious financial institutions to make their phishing campaigns more effective; this technique is known as infrastructure hijacking (Pettersson, 2012)

Computer security - Wikipedia


Computer security, also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software ...

Cybersecurity - Official Site


Strengthening the security and resilience of cyberspace has become an important homeland security mission.

What is cybersecurity? - Definition from WhatIs.com


Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

About Cyber Security | UMUC


Learn about cyber security, or information technology security, and this booming field.

Cyber security standards - Wikipedia


Cybersecurity standards (also styled cyber security standards) are techniques generally set forth in published materials that attempt to protect the cyber environment ...

Tips | US-CERT


For additional tips and resources for all age groups, ... Why is Cyber Security a Problem? Guidelines for Publishing Information Online; General Security.

United States Computer Emergency Readiness Team - Official Site


US-CERT strives for a safer, stronger Internet for all Americans by responding to major incidents, analyzing threats, and exchanging critical cybersecurity ...

Antivirus for Mac | Cyber Security | ESET


Use Mac antivirus to protect your Mac and perform Mac virus scans. Protect against online malware, phishing and social media threats with ESET Cyber Security, the ...

Cybersecurity Overview | Homeland Security


Strengthening the security and resilience of cyberspace has become an important homeland security mission.

Security | Microsoft


Enterprise security from Microsoft helps you protect and defend against cybersecurity threats in your apps, devices, and data.

Cybersecurity Resource Center - OPM.gov


Approximately 21.5 million individuals were impacted by the cyber incident involving background investigation records. The Sign Up information below relates to that ...

Cybersecurity - cnbc.com


Latest news on cybersecurity including online standards, hacking awareness, and increasing digital defense.