1,427
25
Essay, 4 pages (900 words)

Essay on cyber threats and their vulnerabilities

Cyber threats to Computers and Productivity

The security of computer and information systems is a fundamental aspect in any organization because nearly all organizations, in the current information age, depend on computer networks and information systems to execute their daily operations. Attacks to computer systems can lead to detrimental effects to an organization because it can lead to loss of important information and worse, breakdown of the entire organization system. For this reason, Information security measures must be implemented using vigilant approaches in order to control the pervasive effects of cyber threats and vulnerabilities. Control of inadequacies to cyber threats and other forms of malicious attacks should be an ongoing process that must be updated from time to time (Shih et al., 2004). It is emphatically crucial to note that cyber threats to information systems within organizations is evolving and expanding at an increasing rate. This paper highlights the true threats posed by viruses, the extent of the virus and malicious code problem, virus hoaxes, and their effect on computers and productivity. Information systems have distinct capabilities and the use of internet connections is ubiquitous, and hence, cyber threats and vulnerabilities should not be underestimated or undermined. Insider threats are other forms of threats to many organizations because it leads to breach of private and confidential data (Shih et al., 2004).

Cyber Crime

This refers to unlawful conducts undertaken using computers, ancillary, and electronic devices. It entails the process of disrupting network traffic through the distribution of viruses, email bombing/service attacks, cyber stalking, identity theft, and fraud among others. The effects of viruses and malicious attacks can be categorized according to the effects committed against different groups. These groups include crimes committed against individuals, individual property, organizations, and organizations at large. Virus and malicious effects on individuals include indecent exposure, hacking/cracking of personal emails, and harassment (Robert and Dacey, 2007). Effects to individual property include the process of transmitting viruses, unauthorized intrusion into computer systems, and hacking. Threats committed to an organization and society includes cracking, hacking, distribution of pirated software, and polluting the environment with indecent materials.

Extent of Cyber threats to computer systems

The dramatic increase in the number of internet users has expanded the exposure of computer and information systems to susceptibility of attacks such as virus attacks and unauthorized intrusions. The ability of propagation and increased multiplication of viruses and worms can lead to increased damages to the computer and information systems. Sadly, many organizations are still unaware of the threats posed by malicious hackers and cyber criminals. Good examples of the extent of cyber threats can be evidenced in the following scenarios.

According to BBC News story in 2005, the amount of money lost in internet financial fraud in Brazil outstripped the amount of money lost through bank robberies. In the same year, a computer hacker managed to obtain confidential details of 40 million credit card users while British police uncovered efforts by a cyber-gang to steal $412 million from a Japanese bank (Nigel, 2007). Such examples shows that even at the best of circumstances, all organizations are vulnerable to internet threats and cyber insecurities. Data and information is critical for productivity and sustainability of many organizations. Access to sensitive information by hackers or malicious attacks, may prove detrimental to the organization in question because the accessed information may contain sensitive trade secrets or private and confidential information that might be used for doing the wrong things (Nigel, 2007).

While it can be easier to reach a consensus regarding the urgency of risks caused by viruses, worms, and other forms of malicious attacks to computer and information systems, the right answers for addressing such vulnerabilities are hard realize. This can be attributed to constant changing nature of such risks coupled with their level of dynamic and varying effects (Wright, & Harmening, 2009). Additionally, the ability and scale of such risks in compromising computer systems and the integrity of the network framework is wanting. The introduction of host networks and systems, antivirus software, malware, and removal tools had increased the strengths of user administrative features in addition to minimizing the true threats posed by viruses, the extent of the virus and malicious code problem, virus hoaxes, and their effect on computers and productivity.

Conclusion

The increasing sophistication of computer and information systems, coupled with the increased use of the internet has led to an increase in the volume of cyber vulnerabilities. The problem is yet to become worse with the introduction of open systems, cloud computing, and the emergence of intranets. This calls for the implementation of new measures security of computer and information systems. The need to manage, asses, and monitor such systems is critical and even more urgent. Equally important is the need to prioritize and examine the most significant computer and information systems and other network vulnerabilities in order to guide the process of setting priorities and allocating resources towards the prevention of such risks (Robert and Dacey, 2007). With such measures, it becomes possible to minimize the true threats posed by viruses, the extent of the virus and malicious code problem, virus hoaxes, and their effect on computers and productivity.

Nigel, F., (2007),” Challenges for regulating financial fraud in cyberspace,” Journal
of Financial Crime, 14 (2): 190 – 207

Robert F. and Dacey, F. R. (2007). Critical infrastructure protection establishing
effective information sharing with infrastructure sectors. Washington DC: DIANE
Publishing

Shih Dong-Her, et al., (2004),” Internet security: malicious e-mails detection and
protection”, Industrial Management & Data Systems, 104 (7): 613 – 623

Wright, J. & Harmening, J. (2009). Computer and Information Security Handbook. New
York:
Morgan Kaufmann Publications Elsevier Inc.

Thank's for Your Vote!
Essay on cyber threats and their vulnerabilities. Page 1
Essay on cyber threats and their vulnerabilities. Page 2
Essay on cyber threats and their vulnerabilities. Page 3
Essay on cyber threats and their vulnerabilities. Page 4
Essay on cyber threats and their vulnerabilities. Page 5
Essay on cyber threats and their vulnerabilities. Page 6

This work, titled "Essay on cyber threats and their vulnerabilities" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Essay on cyber threats and their vulnerabilities'. 23 February.

Reference

AssignBuster. (2022, February 23). Essay on cyber threats and their vulnerabilities. Retrieved from https://assignbuster.com/essay-on-cyber-threats-and-their-vulnerabilities/

References

AssignBuster. 2022. "Essay on cyber threats and their vulnerabilities." February 23, 2022. https://assignbuster.com/essay-on-cyber-threats-and-their-vulnerabilities/.

1. AssignBuster. "Essay on cyber threats and their vulnerabilities." February 23, 2022. https://assignbuster.com/essay-on-cyber-threats-and-their-vulnerabilities/.


Bibliography


AssignBuster. "Essay on cyber threats and their vulnerabilities." February 23, 2022. https://assignbuster.com/essay-on-cyber-threats-and-their-vulnerabilities/.

Work Cited

"Essay on cyber threats and their vulnerabilities." AssignBuster, 23 Feb. 2022, assignbuster.com/essay-on-cyber-threats-and-their-vulnerabilities/.

Get in Touch

Please, let us know if you have any ideas on improving Essay on cyber threats and their vulnerabilities, or our service. We will be happy to hear what you think: [email protected]