Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
Cybersecurity is considered as a set of tools, strategies and approaches to risk management that can be used to protect the cyber environment, organization and user resources (Manjon). It consists of certain actions for achieve and maintain the security properties of an organization’s or a user’s resources against the corresponding security threats in the cyberspace. The confrontation in cyberspace is a fundamentally new sphere of confrontation between states. The rapidly growing interest in the world in the field of cyberspace is largely due to the activity of various countries in cyber war and cyber security issues. For this reason, the issue of cyberthreat and cybersecurity in the modern world should be brought up, since it
The USA is the state that retains technological and military leadership, and there several directives and official documents regulating political and military activities in cyberspace were adopted at the highest level. Therefore, the US equates acts of cyberattacks with traditional military actions and provides for the possibility of responding to serious attacks with proportional and just military measures, up to the use of nuclear weapons. At the same time, the representatives of the Pentagon state that the developed doctrine is only the first step towards the development of cyberspace. Additionally, the US intelligence agencies work regularly on strengthening the cyber defense of the state. Nevertheless, certain events have led to the idea that there are certain groups of people who are in the country they intend to attack for a long time and collect information on how to hack important files or money from accounts.
For example, in 2011 Citigroup Inc, a banking group, reported 360,000 casualties because of a hacker attack on a database in the United States. The hackers broke into the computer network RSA, having access to information about the technology SecurID, which is used to ensure the security of corporate computer networks. Subsequently, a list of companies whose computer networks were probably compromised using the same resources as when attacking the RSA network was published. Obviously, this was done via the Internet, and hackers managed to access the personal data of account holders (Ramsbotham et al, 426). It can be concluded that cyberattack is a planned action against a company or companies with the aim of frightening, disarming or stealing data of varying importance and then using them. Undoubtedly, it implies work of many spies, hackers and “actors” who communicate with others to achieve their goals. It lasts for a long, but cyber hackers every year are harder to calculate.
Manjon, Marcelo. A Framework to Help Make Sense of Cybersecurity Tools. Network World, June 4, 2015. Accessed on 28 March 2018 from networkworld.com/article/2931576/security0/a-framework-to-help-make-sense-of-cybersecurity-tools.html.
Ramsbotham, O., Woodhouse, T., Miall, H. Contemporary Conflict Resolution. Polity Press, Third Edition, 2011. MA, USA.
Hire one of our experts to create a completely original paper even in 3 hours!