Responding to Cyber Attacks

Document Type:Research Paper

Subject Area:Technology

Document 1

For instance, mobiles have an alarm application that can be used by patients as a reminder of medication intervals. Besides, there is security cameras used at home to monitor all activities thus guaranteeing security. (Kagermann, pg. 35), emphasizes that infrastructure digitization and automation are crucial public services that impacts networks of power grids and water supply, smart transportation systems and other several innovations that are making our ecologic, economic of our homes and cities sustainable and effective. However, as the world increasingly get connected with World Wide Web, cyber security increasingly growing to be the greatest threat associated with widespread use of the internet. Corporations that fail to take actions of protecting themselves from cybercriminals get their business at risk of failure.

Sign up to view the full document!

Security of information within an organization is essential and promotes smooth operation of the business. Hence, there are some procedures that all individual and corporation should consider in in the improvement of their personal and business security. First, it is the responsibility of every company to assess the threats and risks and identify their sources. (Poovendran, pg. These links could compromise the communication and internet system of the organization. There can simply be frequent workers training programs on the digital security that will help them understand the costs of cyber risks to the entire organization. Furthermore, companies should be cautious of the internal and external cyber-attacks to determine individuals or organizations that may be targeting their attacks on the organization. The attack may be internal where the individuals secretly join the organization with the motivation of gaining access to the data system and steal it.

Sign up to view the full document!

Also, the employee within could negotiate with the criminal and provide them with passwords to the data for financial gains. However, the measures taken need to be properly assessed before implementation to ensure it does not interrupt with business operation and daily routines. (Carr, pg. 59), proposes that both private and public companies should take some measures to secure their data infrastructure as discussed below; these sectors should overcome existing restrictions and take the action in protecting their business and National information from theft by cybercriminals. Individuals and private sectors should collaborate with the government to ensure internet security. Everyone should learn about ways to protect themselves from exposure and risk of cyber-attacks. (Shen, pg. 16), states that through the framework, experts will be able to share infrastructure and unite participant inventiveness to protect corporations and nations from system attacks.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable