Sources of Internet Security Threats

How This Custom Writing Service Works

1. Place your order

Provide all instructions about the type of paper, length, deadline and pay.

2. Thorough research

Our team of professional writers conduct in-depth research on the topic to extract information from relevant sources.

3. Writing and proofreading

The experienced writers knit together all ideas into an original paper. Our editors go through the paper to correct any errors.

4. Product Delivery

You get your completed paper in your email. In case you need any corrections, we do ammendments free of charge.

Step 1 of 2

  • Price: $0.00

Why Buy Dissertations from us?

100% Original writing

No plagiarism. Original content written from scratch just for you. and custom free plagiarism report

Affordable writing service

Get your paper at a cheaper price than our competitors. Save money.

Timely delivery of orders

Never miss your submission deadlines again. We keep time & help you smile.

24/7 Customer support

Contact customer support or your writer any time for updates, drafts, etc. Call, Text, Whatsapp.

100% Private & Confidential

Your connection is private, your personal & payment information is secure

Need help placing your order?

Let nothing stop you from enjoying the best writing services. Save your time and focus on other aspects of your studies as professional writers work on your paper.
Affordable

Sources of Internet Security Threats

Information confidentiality is one of the major concepts that determine its reliability depending on its purpose. Availability of information on network demands for authorization and authentication of persons authorized to access that information. This paper will provide a summary on the sources of security threats based on various sources in the bid of understanding of information securities from different perspectives. Information on a network can be corrupted if the network is not secure. Confidential information should not be accessible to anyone who is not authorized and once it’s read or copied by unauthorized persons it loses its confidentiality.

One fact that remains true is that no one is immune to attacks on the internet we are vulnerable to having people who will gain unauthorized access to what we have had a security system on. Once the unauthorized person has access to any sensitive information they are able to manipulate it at will and commit crimes in a wide variety of ways(Riley 2011). Surprisingly, if we are not careful one might lose all they have through the actual immediate gain by the unauthorized person. Most institutions affected by these include insurance companies, brokerage houses, government contractors in all sectors, insurance companies and many others. This demands that the institutions have to get the professionals who will offer the best protection against any attack or leak of information in any way.

Security administrators and information technology professionals in every company need to decide the amount of time they will spend in order to come up with the appropriate security policies and controls. In the development of these policies security administrators also need to decide the amount of money they need and the effort needed in order to be effective. The amount of money to be spent depends on how vital the information is and the risk the company will face is the information lands on unauthorized persons. Every company has a different strategy and a unique security system, policies, and control; however, the principles of an effective security system are the same. Security is not a onetime activity but an integral part of a lifecycle which will save a company valuable time and provides a reminder of what needs to be done.

Personal information such as intellectual property, taxpayer details, medical records, social security records, financial records and other sensitive examples of sensitive information should be protected in the best way possible. Once this information is disclosed, stolen or copied, one of the basic reasons why this happens is with the intention of stealing the identity of the owner of this information. Critical operations and private transactions might be disrupted, deleted or modified to benefit the thief. Another major purpose of having this information is to benefit financially from the owner of this information.

Sensitive information as discussed earlier, authentication and authorization go hand in hand users must be authenticated, this makes security strong since it means that anyone in a particular institution must be authenticated before carrying out any activity they have been authorizing to do(Khalif, 2011). The authentication system keeps the information secure, makes readily available to the authorized person and allows the users to trust the information they find. Any activity that takes place can be well followed up and one is able to know who did a particular thing, this means that the user cannot later deny having done that particular activity.

There are various attacks that have a probability of taking place if the information one does not establish an effective and secure working information platform. One is malware that attacks the computer hardware, storage equipment, and servers. Software attacks is also another attack where the software is used as a weapon that stops the physical hardware from working. Often, a software damages another software the same way a software can be manipulated to utterly destroy or cripple a computer physically. That means that one can alter software to gradually make changes in computer hardware to ultimately destroy it beyond restoration.

There are various factors to consider during security enhancement, some of these factors are; identifying assets and vulnerabilities, likely attack tactics, methods, and techniques, establishing a strategy to handle all types of attacks and finally how effective and long-lasting the strategy is. Listing the security threats an organization faces helps the security administrator identify the best technique or method to be used in the occurrence of attack (Riley 2011).  A good example is emails; there are various methods of breaking into an email which ranges from viruses

During security and while taking the necessary precautions one must come up with a strategy that will put the whole situation in control. One must determine the damage an attack will cause on a system compared to other threats. He/she must also determine the vulnerabilities exploited by an attack and during the attack, this allows for an effective strategy that will help sustain confidentiality and reliability of a strategy (Silik, 2000). A post-attack strategy is also vital in an institution. This strategy revisits the predicaments brought about by the attack for repairs and for reference during in preparation of a pre-attack strategy.

In conclusion, every organization must come up with strategies that will control the situation before an attack takes place, during the attack and after the attack takes place (Kizza,2017). Each strategy must be tested and given out positive outcomes through a simulation attack in a lab. Incidence response team must also be put in place, their work will be conducting system attack studies, research on viruses and developing other computer security tools.

 

 

Reference

Gupta, B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Hershey: Information Science Reference.

Kizza, J. M. (2017). Guide to Computer Network Security.

Cliff Edwards, Olga Kharif, and Michael Riley (2011). Human Errors Fuel Hacking as Test Shows Nothing Stops Idiocy

Pesante, L. (2008). Introduction to information security. Retrieved from https://www.us-cert.gov/sites/default/files/publications/infosecuritybasics.pdf

Types of Academic Papers

Essay
Dissertation
Research Paper
Reaction Paper
Lab Report
Journal
Book Report
Book Review
Movie Review
Synthesis Paper
Review of the Literature
Research Proposal
Thesis Proposal
Dissertation Proposal
Annotated Bibliography
Article Critique
Term Paper
Case Study
Capstone Project
Artices
Presentation Design
Mathematical Problem
Mind Game
Tricky Questions

Dissertation Chapters

Dissertation Abstract

Dissertation Introduction

Dissertation Literature Review

Dissertation Methodology

Dissertation Results

Dissertation Discussion

best essay writing services

Types of Essays

Expository essay
Analytical essay
Persuasive essay
Narrative essay
Definition Essay
Descriptive essay
Process Essay
Personal essay
Admission essay
Compare and contrast essay
Cause and effect essay
Critical analysis essay

Order Your Custom Paper Now

Step 1 of 2

  • Price: $0.00

Acoustics
Agriculture
Anatomy
Animation
Anthropology
Archeology
Architecture
Artificial Intelligence
Arts
Astronomy
Biological Sciences
Biology
Business Management
Business Studies
Chemical Engineering
Chemistry
Civil Engineering
Communication
Computer Science
Construction

Consumer Science
Criminology
Cultural Studies
Design
Divinity
Earth Sciences
Economics
Education
Electrical Engineering
Engineering
English Language
Environment
Family
Fashion
Finance
Food Science
Forestry
Gender Studies
Geography
History

Human Resource Management
Journalism
Law
Library
Literature
Logic
Management
Marketing
Marketing
Mathematics
Mechanical Engineering
Media
Medicine
Military Sciences
Museum Studies
Music
Nursing
Nutrition

Philosophy
Physics
Political Science
Programming
Psychology
Public Administration
Religious Studies
Science
Social Work
Sociology
Software Engineering
Space Sciences
Sports
Statistics
Systems Science
Technology
Textiles
Theology
Transportation
Veterinary Medicine

Write My Dissertation offers top-notch customer support services. 

When working on your dissertation paper, expect to find us online via Live Chat 24/7/265. 

Our customer support agents are always ready to listen to you and deliver a quality dissertation.

Be free to contact the customer support team if you have any questions or comments.

How To Order PhD dissertation

Could you help me write my dissertation?

Yes. That’s our work to write a dissertation.

Use the green order form to order the entire dissertation.

Instead of pay someone randomly selected from the internet, it’s good to use a reputable company like WMD which specializes in dissertation services.

It’s now easy to buy academic papers online. You can phone place order, fill out the order form, pre order product and hire someone to write your paper just like that. Expect to get great work, just like many others have, for your first order and all others.

You’ll experience the best, get your order 100% unique and delivered in time (timely delivery).

Write my dissertation delivers custom writing services to customers from all states in the USA. Our services are provided in the English language. You can find the best custom dissertation services if you are from any of the following states or territories in the United States of America: 

Alabama, Alaska, American Samoa, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, District of Columbia, Florida, Georgia, Guam, Hawaii, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Minor Outlying Islands, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Northern Mariana Islands, Ohio, Oklahoma, Oregon, Pennsylvania, Puerto Rico, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, U.S. Virgin Islands, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming

If you need dissertation writing help in the English language, then we’ve got you covered.

Our clients are mainly English speakers  from: Australia, New Zealand, United Kingdom, United States, Antigua and Barbuda, Bahamas, Barbados, Belize, Canada, Dominica, Federation of Saint Christopher and Nevis. Others include Fiji, Ghana, Grenada, Guyana, Ireland, Jamaica, Kenya, Liberia, Nigeria, Papua New Guinea, Saint Lucia, Saint Vincent and the Grenadines, Sierra Leone, Singapore, South Africa, Trinidad and Tobago.