Computer Security: The Field Of Cyber Security

833 Words2 Pages

Cyber security is defined as the protection of information on computer systems and the protection of the hardware that supports or stores the information on computers or servers. This level of protection can include controlling physical access to the hardware, as well as protecting against harm that may come from local or remote network access, data and code injection and due to malpractice by system operators, who may have been tricked by outside personnel to place the system in a compromising situation. The field of cyber security is growing and becoming a major concern for governments and businesses due to the society’s increasing reliance on computer systems. Based on this level of threat, network security has been brought to the forefront …show more content…

These cyber-terrorists exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. A range of traditional crimes are now being performed through cyberspace. This includes the production and distribution of child pornography and child exploitation conspiracies, banking and financial fraud, intellectual property violations, and other crimes, all of which have substantial human and economic …show more content…

Cyber-attacks and intrusions are becoming more and more prominent and need to be met head on with new measures.
We should concentrate on the preventive/defensive cyber security measures when it comes to our country’s security. Mitigating and preventing attacks to our networks should be the primary goals, but I can see maybe having to do some offensive measures every once and awhile. A strong defense will prevent most of the attacks and be used to collect information from the terrorists. This information can be used to send people in to stop the cells at the ground level.
With the PSN help and coding information it can be performed, but it will take a lot of man hours to comb through all the information both visual and texting to decipher and determine if it is a possible terrorist cell. The government would also have to spend millions possible billions to set up server rooms to record all the information and then supply the man hours to view all the

Open Document