Hlsc710-discussion 1-reply2 | HLSC 710 – Contemporary Issues in Cyber Security and WMD (CBRNE) Threat Analysis | Liberty University

Contemporary Issues in Cyber Security

The response must be 200 words    Cyber Security and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been published within the last five years. Acceptable sources include texts, articles, presentations, the Bible, blogs, videos, etc.

Textbook:

Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.

Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.

DENNIS

Cyber security is becoming increasingly important in today’s society with the mass integration of so many integral systems onto the World Wide Web. There are systems that keep individuals’ medical data, banking systems that are completely connected globally, and even social media that is internet-based but keeps the privacy of millions of people. With the increasing need for internet capabilities in almost all spectrums, so comes the need for top-notch security to protect all of that information. Even the top-secret systems that are used by the military and intelligence agencies are interconnected on their own web-based services to allow for communication and dissemination of appropriate information. Cyber security has to deal with a myriad of different types of attacks that could happen at a moment’s notice. It is difficult to tell if a cyber security system is good because it is only as effective as the number of successful deterrents to attacks. However, a cyber security system would be considered a failure simply with one successful attack on the system it is trying to protect.

Botnets are a type of attack that is discussed by Johnson (2015), and is referred to as “a network of compromised computers that can be coordinated remotely by a cyber-criminal or an attacker to achieve an intended and malicious purpose” (p. 15-16). It is not always malicious but is used by hackers to infiltrate and withdraw information. One of the more common botnet attacks is called a distributed denial-of-service attack or DDoS attack. The point of this type of attack is to overwhelm a system with massive amounts of data and cause that system to shut down or become ineffective. A DDoS attack is seen as one of the most powerful attacks that can happen because it can happen at any time and can shut down a system, causing financial losses due to outages and even creating political disruptions, according to Cook (2021).

The top three cyber threats that face the US today, according to the ICAEW Business Advice Service (2021) would be ransomware, phishing, and data leakage. It is interesting to note that with all of the attacks that happen on the cyber side of things, one of the top three risks still has to do with human error and data leakage. I believe that the most significant change that has occurred in the realm of cyber security is just what I mentioned at the start, that full integration of every detail of a human’s life and privacy is woven into the fibers of the internet. With all of this information available online, cyber security becomes that much more important to protect every person’s privacy. The most significant threat we will face in the future has to be sheer data load. There is a show on HBO called Silicon Valley, and they have many mishaps and comedic values, but they focus on a real issue also: cyber security. It is so difficult to imagine the amount of data that is floating around on the internet now, and that amount increases exponentially daily. There is simply not enough servers to handle all of the data, therefore it is becoming a crisis that will have to be solved by the “cloud”. This, however, opens up the entire realm of the internet to attacks that could cause the loss of entire chunks of data, like banking information or stock market purchases or sales. If proper cyber security is not practiced, the entire financial market could be shut down by one attack.

In 1 Peter 5:8, the Bible talks about being vigilant because our adversary is walking around seeking whom he may devour. A Christian’s adversary is the devil, and he, like a well-trained hacker, is simply looking for an opening in our lives to get on the inside and destroy us. We must remain vigilant and trust the Lord to protect us from those attacks.

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
    See full FAQ

    Take your studies to the next level with our experienced specialists

    Chat
    Hello, my name is Derreck. Kindly drop your inquiry; I will get back to you shortly. (WhatsApp)+254 729 707 173