AllFreePapers.com - All Free Papers and Essays for All Students
Search

Emerging Cyber Technologies

Autor:   •  March 11, 2017  •  Research Paper  •  3,746 Words (15 Pages)  •  673 Views

Page 1 of 15

Emerging Cyber Technologies

CSEC670

Individual Assignment 1

Table of Content

Introduction-------------------------------------------------------------------------------------- 3

Cybersecurity Necessity------------------------------------------------------------------------ 3

Spectrum of Cyber Threats-------------------------------------------------------------------- 4

Cybersecurity Technology-Emerging-------------------------------------------------------- 8

Role of Federal Government-----------------------------------------------------------------13

Benefits and Drawback of Government Role-----------------------------------------------14

Conclusion---------------------------------------------------------------------------------------15

References---------------------------------------------------------------------------------------16

Introduction

People tend to forget that hacking and technology attacks have been around way before the creation of the internet. Back in the 1970s, “phreaking”, or the act of hacking phone lines to make free calls, were the popular attacks (1). History fought through several virus attacks in 1980s, but, it wasn’t until the 1989 that we witnessed the first worm attack on the internet. Robert Morris unleashed the first computer worm, which managed to take down much of what was online at the time (1). Over the following two and half decades, society became more and more technologically based. We observed banking being conducted over the internet, phones becoming mobiles, computer went from desktop to portable, and much more. This meant with time the amount of data constructed on a daily basis grew, making our lives more vulnerable than ever before.

Cybersecurity Necessity

Cyber usage is an international phenomenon that has crossed barriers in which society has never been able to achieve before. Just about every day, the average person will utilize some form of electronic or wireless device to perform their daily task, as our world has shifted into the digital age (Rodosek & Golling, 2013). Social networking through cyber computing and mobile computing and the organizational integration into corporate networks has triggered a new wave of technology and access. Watching television, cooling your home in warm weather, health records, and shopping

...

Download as:   txt (26.4 Kb)   pdf (75.4 Kb)   docx (20.7 Kb)  
Continue for 14 more pages »