System and Method of Mitigating Cyber Attack Risks Paper Example

Paper Type:  Essay
Pages:  4
Wordcount:  857 Words
Date:  2022-11-20

The Internet is a network that connects devices such as computers and allows them to transmit data hence allowing sharing of information and resources globally. More people are using the internet more than before. Increased use of the internet is attributed to the increased penetration of smartphones that can access the internet. The Internet has made communication easier since people can share information in real time regardless of where the person is located. However, there are various challenges faced by internet users while using the internet, among the challenges include cybercrime where cybercriminals use the internet to exploit other users for their selfish gain. Cybercrime has become a significant challenge affecting the use of internet where the internet users are worried about being attacked and losing their data as well as finances. The cybercriminals steal personal information of the users that they then use to attack the user for commercial use.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

There are three main types of crimes that the cybercriminals usually use to exploit their victims, among the crimes is when they target people with malicious intentions such as stalking the person to acquire the intended information about them. They end up using the information that they have acquired regarding the person to exploit them further. The other type of crime includes computer offenses such as accessing certain networks of companies and obtaining their data that the criminals will finally use to exploit the company. Some attacks are even meant to destroy the data of the companies making their operations harder. The last category of attacks includes organized crime such as fraud and theft where the cybercriminals use the internet to steal from other internet users. People face challenges in protecting the identities online, among the measures that they are taking include verifying the accounts online to make the public know their real accounts.

Cybercrime has evolved over the years to become a leading threat among internet users. The threat of being attacked is higher than before hence people need to be careful on how they use the internet. More cybercriminals are increasing on the internet than before. The amount of money that is being lost by the public due to cyber-related instances is estimated to have been $600 billion. People lose their identities where the cybercriminals use the identity of other people to exploit victims known to the person whose identity has been stolen. Individuals and companies are losing huge amounts of money when attacked hence affecting their daily lives. Many of the crimes end up unreported, and there it's difficult to estimate the real value in the amount of money being lost.

The public need to be educated on measures that they need to take while using the internet to protect themselves against attacks. Companies are putting up measures that are meant to protect the companies from being attacked. There are devices and software's that are installed on the companies networks to protect them against attacks. The public need to be trained on how to use the internet responsibly to avoid attacks. Companies can hire experts that deal with cybercrimes such as white hat hackers that will check the vulnerable areas and fix them to prevent possible attacks. Cybercriminals caught should be prosecuted for their actions for other people to learn that cyber-attacks are illegal.

Some laws have been set to regulate the use of the internet and control the cyber threats that exist. The law has tough consequences to those people whore are caught having committed cyber-related crimes. Cyber threat discourages investors from investing in technologies that face cyber threats, and therefore the law ensures that such investors are guaranteed protection of their investments. People need to be educated on the risks that exist while they are using the internet and how they can avoid and deal with the threats. Many people are worried about cyber-attacks, especially while doing transactions.

Conclusion

In conclusion, the threat of cyber-attacks will continue to increase as more people are being connected to the internet. Internet users and companies need to take appropriate actions to ensure they are safe while using the internet. Companies can also insure themselves against cyber-attacks to be on the safe side in case they are attacked. People also need to be regularly updated on the new tricks that cybercriminals are using to put measures that will reduce the chances of them being attacked.

References

Abawajy, Jemal, Bharat Bhargava, and Neal N. Xiong. "Foreword and editorial: International journal of security and its applications." International journal of security and its applications 10, no. 5 (2016): v-xii.

Bossler, Adam, Thomas J. Holt, and Kathryn C. Seigfried-Spellar. Cybercrime and digital forensics: An introduction. Routledge, 2017.

Gringras, Clive, and Paul Lambert. The laws of the Internet. Bloomsbury Publishing, 2015.

Henson, Billy, Bradford W. Reyns, and Bonnie S. Fisher. "Cybercrime victimization." The Wiley Handbook on the Psychology of Violence (2016): 553-570.

Reyns, Bradford W., Bonnie S. Fisher, Adam M. Bossler, and Thomas J. Holt. "Opportunity and Self-Control: Do they Predict Multiple Forms of Online Victimization?." American Journal of Criminal Justice (2018): 1-20.

Watters, John P., Frederick Doyle, Henry Peltokangas, and Matthew Keane. "System and method of mitigating cyber attack risks." U.S. Patent Application 15/688,453, filed August 28, 2018.

Cite this page

System and Method of Mitigating Cyber Attack Risks Paper Example. (2022, Nov 20). Retrieved from https://proessays.net/essays/system-and-method-of-mitigating-cyber-attack-risks-paper-example

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism