Securing Networked Computers for Global Defense

2046 Words5 Pages

Technology is a crucial component to many peoples’ lives. As it continues to advance and become widespread throughout the world, peoples’ reliance upon computers especially increases. Computers are responsible for storing and sending extremely sensitive data; the unwanted interception of this data can lead to catastrophic outcomes. Keeping sensitive data absolutely secure is impossible, but setting up defenses to optimally protect it is essential. The 2008 CSI Computer Crime & Security Survey states that when asking organizations if they had experienced targeted computer attacks that year (2008), 27 percent of 355 respondents reported they had. The previous year (2007), 32 percent of the 252 respondents said they had experienced attacks. Networked computer security defenses are implemented to protect against these targeted attacks, causing system intruders to change their focus, "…toward stealthier attacks that are more effective because they are targeting specific organizations or industry segments," (18, Richardson). Although there was a 5 percent decrease in attacks per year, there is still a significant threat of targeted attacks present in the world, "Targeted attacks—hypothetical just a handful of years ago—are a significant reality today" (18, Richardson). As the world continues converting to electronic means of storing data, it is essential that personal and private information remains protected to ensure the security, and therefore the prosperity, of individuals, businesses and governments.

All computers connected to the Internet face serious potential threats. As the Internet continues to advance, made apparent especially in the switch from web 1.0 to web 2.0, users and developers are granted more fre...

... middle of paper ...

...ime & Security Survey."

http://gocsi.com/. Computer Security Institute, 2008. Web. 15 May 2010.

.

FINEXTRA. "Court Allows Suit Against Bank for Poor Online Security."

www.finextra.com/. FINEXTRA, 08 Sept. 2009. Web. 17 May 2010.

.

Secure Enterprise 2.0. "WEB 2.0 HACKING INCIDENTS & TRENDS."

www.secure-enterprise20.org/. Secure Enterprise 2.0, May 2009. Web. 8 May 2010.

.

Federal Financial Institutions Examination Council. "Authentication in an Internet Banking Environment."

http://www.ffiec.gov/. Federal Financial Institutions Examination Council. 08 Aug. 2001. Web. 17 May 2010.

More about Securing Networked Computers for Global Defense

Open Document