The Future Challenges of CyberSecurity - Tope Omidiji - E-Book

The Future Challenges of CyberSecurity E-Book

Tope Omidiji

0,0
13,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Essay from the year 2015 in the subject Computer Science - Internet, New Technologies, Webster University, course: ITM 5000 07, language: English, abstract: The Internet has brought the world closer than ever, especially, with the ease in sharing information. A post online from Alpine, Texas can be accessible almost immediately by someone in Accra, Ghana and at the same time with the person in Bangalore, India. As much as there is access to the Internet, authorized users can access information/data irrespective of their location. Business activities are now performed globally and efficiently in comfort; buyers and sellers do business without any constraints. Business supporting activities such as paying and receiving of cash, shipping of goods, and other related activities have now been automated in the cyberspace. The most reliable resource vault or knowledge center accessible by all is the Internet; it could even be referred to as one of mankind’s greatest achievement. However, it has also made all users including governments, corporate institutions and business entities exposed and vulnerable to numerous cyber crimes. The risk of losing personal data or theft of an important data like customer data from an organization by cyber criminals has become very high. Cyber security remains the biggest challenge faced by all especially governments and organizations.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB

Veröffentlichungsjahr: 2015

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Impressum:

Copyright (c) 2015 GRIN Verlag / Open Publishing GmbH, alle Inhalte urheberrechtlich geschützt. Kopieren und verbreiten nur mit Genehmigung des Verlags.

Bei GRIN macht sich Ihr Wissen bezahlt! Wir veröffentlichen kostenlos Ihre Haus-, Bachelor- und Masterarbeiten.

Jetzt beiwww.grin.com

INHALT

 

Introduction

Works Cited

 

Introduction

 

The Internet has brought the world closer than ever, especially, with the ease in sharing information. A post online from Alpine, Texas can be accessible almost immediately by someone in Accra, Ghana and at the same time with the person in Bangalore, India. As much as there is access to the Internet, authorized users can access information/data irrespective of their location. Business activities are now performed globally and efficiently in comfort; buyers and sellers do business without any constraints. Business supporting activities such as paying and receiving of cash, shipping of goods, and other related activities have now been automated in the cyberspace. The most reliable resource vault or knowledge center accessible by all is the Internet; it could even be referred to as one of mankind’s greatest achievement. The Internet [Information Technology] revolution became dominant around early 1990’s and here are the key areas impacted.

 

Trading – Foreign exchange transactions, Forex trading, NASDAQ.

 

Marketing – Online Popups, bulk email, and several online marketing dynamics.

 

Education – Online degrees, online certification trading, online class registration.

 

Entertainment – Music [iTunes, Tidal, YouTube, Spotify], movies and TV shows [Netflix], TV-shows, sports [ESPN online live stream].

 

Communication – VOIP, Instant messages, video conferencing and video calls.

 

Banking and Transaction – Wire transfers, online transfers, online payment, online banking, EBay, Amazon.

 

Cyber security assessment

 

In reality, the Internet or cyberspace as the case maybe has become so attractive, infect, it is now part of our life that we cannot live without. However, it has also made all users including governments, corporate institutions and business entities exposed and vulnerable to numerous cyber crimes. The risk of loosing personal data or theft of an important data like customer data from an organization by cyber criminals has become very high. Cyber security remains the biggest challenge faced by all especially governments and organizations. One of the techniques used in taming cyber crime activities is by tracking and tracing the source of an attack or threat using the IP [Internet Protocol]. The IP and TCP [Transmission Control Protocol] are used to facilitate connection from the source to the destination. They are also classified as source and destination IP’s as the case maybe. On a cyber security standpoint, when an IP is successfully tracked, it can help reveal the location of a user [cyber criminal] by displaying the source and destination of the data. Unfortunately, tracking of IP/TCP is no longer effective as they can be changed or manipulated such that it does not reveal their exact location. It is also often used when downloading illegal digital contents like movies. The table below illustrates how a computer network IP-TCP can be hidden/changed, a basic trick commonly used by hackers and users who are about to perform malicious activities online.

 

 

Copied from coolhackingtrick website

 

 Click on "Start" in the bottom left corner of the screen.

 

 Click on "RUN"

 

 Type in "command" and click OK

 

 MSDOS prompt Screen