Write review for article - cybersecurity

Assignment Help Software Engineering
Reference no: EM132066920

Write review for this article.

While media coverage of vulnerabilities in the media can present challenges, the coverage also presents awareness opportunities. Media coverage can provide awareness not only to security professional but also to those within an organization tasked with making security decisions.

Budgeting for computer security can be taxing and the cost can sometimes seem expensive. Vulnerability awareness can help stress the importance of adequate security measures and hopefully lead to wise decisions regarding allocating funds for security. The media can be useful for gathering data.

Sometimes media representatives and their staff may be able to contact individuals or organizations that security professionals may not be able to reach. The media can be used as a tool to widely disseminate the information among people in many different areas of knowledge. Proverbs 15:22 says "The lips of the wise spread knowledge; not so the hearts of fools." One of the challenges comes when the media fails to present accurate information.

It can also be challenging when the media incites unnecessary fear or frenzy. Proverbs 15:14 says "The heart of him who has understanding seeks knowledge, but the mouths of fools feed on folly." It is not unusual for the media to exaggerate or sensationalize vulnerabilities that may not be as dangerous as the media makes it seem. I believe security breaches with never be eradicated. As long as computers exist, there will be security threats. The motivation for breaches may be changing but not decreasing. In the future, attack tools will be able to better learn from its environment in order to avoid detection and more effectively exploit vulnerabilities.

Current laws and regulations are so varied and confusing and provide little recourse for the victims of breaches seeking damages through civil suits. Legislation issued by Congress often focuses heavily on responding to cyber attacks rather than preventing them (Vail, 2017). Ineffective protections for victims of breaches gives companies little incentive to work swiftly to rectify vulnerabilities.

The ambiguousness of the laws makes it difficult for the situations with breaches to get better especially where there is no accountability.

Cybersecurity must be prioritized on the highest level of an organization in order to be effective. Organizations must be willing to invest resources into strong security measures. Plachkinova, M., & Maurer, C. (2018). Security breach at Target. Journal of Information Systems Education, 29(1), 11-19. Vail, H. (2017). Cybersecurity reform in the wake of the OPM breach. Suffolk University Law Review, 50(1), 221.

Verified Expert

The solution provides the review of the article provided in the question. The solution is written in 375 words and follows APA referencing style. It has four references with in text citations mentioned. The solution is unique with no plagiarism.

Reference no: EM132066920

Questions Cloud

Describe the culture at toyota motor corporation : What could other organisations learn from Toyota's experiences and the importance of organisational culture& power?
Depreciation added back to operating cash flows : In developing the cash flow statement, why is depreciation added back to operating cash flows and to fixed assets?
Describe the considerations that you would take into account : Describe the considerations that you would take into account when selecting the menu style for an application and why. Support your response with examples.
Explain each stage of the management plan : You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists.
Write review for article - cybersecurity : Write review for this article - While media coverage of vulnerabilities in the media can present challenges, the coverage also presents awareness opportunities
Calculate the project operating cash flows : Calculate the project’s internal rate of return (IRR). Calculate the project’s operating cash flows.
Assuming bing uses sum-of-the-years-digits method : what is the depreciation expense assuming Bing uses sum-of-the-years'-digits method?
Find the rms output voltage from the detector : If a PLL FM detector receives an FM signal with a deviation of 75kHz and sine wave modulation and the VCO has a proportionality constant of 120kHz/V
Voltage across a capacitor cannot change instantaneously : In transient analysis of an rc circuit, why can't the voltage across a capacitor cannot change instantaneously?

Reviews

inf2066920

10/8/2018 2:01:27 AM

Received the solution in a well-mannered way. Thank you for the assignment. l cant ask for more from you. am so happy for all your help.

inf2066920

10/8/2018 12:17:25 AM

I believe security breaches with never be eradicated. As long as computers exist, there will be security threats. The motivation for breaches may be changing but not decreasing. In the future, attack tools will be able to better learn from its environment in order to avoid detection and more effectively exploit vulnerabilities. Current laws and regulations are so varied and confusing and provide little recourse for the victims of breaches seeking damages through civil suits. Legislation issued by Congress often focuses heavily on responding to cyber attacks rather than preventing them. Ineffective protections for victims of breaches gives companies little incentive to work swiftly to rectify vulnerabilities. The ambiguousness of the laws makes it difficult for the situations with breaches to get better especially where there is no accountability. Cybersecurity must be prioritized on the highest level of an organization in order to be effective. Organizations must be willing to invest resources into strong security measures.

inf2066920

10/8/2018 12:10:27 AM

i have to write review for this article. While media coverage of vulnerabilities in the media can present challenges, the coverage also presents awareness opportunities. Media coverage can provide awareness not only to security professional but also to those within an organization tasked with making security decisions. Budgeting for computer security can be taxing and the cost can sometimes seem expensive. Vulnerability awareness can help stress the importance of adequate security measures and hopefully lead to wise decisions regarding allocating funds for security. The media can be useful for gathering data. Sometimes media representatives and their staff may be able to contact individuals or organizations that security professionals may not be able to reach. The media can be used as a tool to widely disseminate the information among people in many different areas of knowledge.

Write a Review

Software Engineering Questions & Answers

  Architecture tradeoff analysis method

what is the methods for according to specific quality attribute like (performance, reliability  ...etc.)?Is it possible to use  Architecture Tradeoff Analysis Method  ( ATAM )  for optimization ?

  Recommend three specific tasks that could be performed

Recommend at least three specific tasks that could be performed to improve the quality of datasets, using Software Development Life Cycle (SDLC) methodology.

  Answer the following questions using apa style and citing

answer the following questions using apa style and citing at least one credible source per answer with in-text and

  What is a silver bullet in software engineering

What is a silver bullet in software engineering? From the article "No Silver Bullet" by brooks.

  Why is the role of the systems analyst

Why is the role of the systems analyst so critical in a systems development project? Explain what skills and knowledge are required to be effective.

  Designing e-r diagram for each product at pvf

Suppose that at PVF, each product. Design E-R diagram for this situation and state minimum and maximum cardinalities on the diagram.

  Understanding a real-time and time-critical system

ITECH 7410: Software Engineering Methodologies Assignment. The purposes of the assignment: Understanding a real-time and time-critical system. Understanding Entity Relationship Diagram and Data Flow Diagram in terms of a real time software system

  Create a sequence diagram for each of the given scenario

Create a sequence diagram for each of the following scenario descriptions for a health club membership system When members join the health club, they pay a fee for a certain length of time.

  What is the maximum number of paths through the graph

What is the maximum number of paths through the graph and what is the approximate minimum number of paths through the graph?

  Create high-level use cases for the customer requirements

Topic - Software Engineering. Create high-level use cases for the customer requirements described in the Course Project Instructions

  First journal entry to record sales

12,000 dollar discount, use 60,000 points pay $48,000 how many points does 13,500 represent. Prepare shoes on first's journal entry to record those sales.

  Describe the importance of integration testing

Describe the importance of integration testing. Provide example test cases that would be included in the integration test for your GUI application.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd