Write review for article - cybersecurity

Assignment Help Software Engineering
Reference no: EM132066920

Write review for this article.

While media coverage of vulnerabilities in the media can present challenges, the coverage also presents awareness opportunities. Media coverage can provide awareness not only to security professional but also to those within an organization tasked with making security decisions.

Budgeting for computer security can be taxing and the cost can sometimes seem expensive. Vulnerability awareness can help stress the importance of adequate security measures and hopefully lead to wise decisions regarding allocating funds for security. The media can be useful for gathering data.

Sometimes media representatives and their staff may be able to contact individuals or organizations that security professionals may not be able to reach. The media can be used as a tool to widely disseminate the information among people in many different areas of knowledge. Proverbs 15:22 says "The lips of the wise spread knowledge; not so the hearts of fools." One of the challenges comes when the media fails to present accurate information.

It can also be challenging when the media incites unnecessary fear or frenzy. Proverbs 15:14 says "The heart of him who has understanding seeks knowledge, but the mouths of fools feed on folly." It is not unusual for the media to exaggerate or sensationalize vulnerabilities that may not be as dangerous as the media makes it seem. I believe security breaches with never be eradicated. As long as computers exist, there will be security threats. The motivation for breaches may be changing but not decreasing. In the future, attack tools will be able to better learn from its environment in order to avoid detection and more effectively exploit vulnerabilities.

Current laws and regulations are so varied and confusing and provide little recourse for the victims of breaches seeking damages through civil suits. Legislation issued by Congress often focuses heavily on responding to cyber attacks rather than preventing them (Vail, 2017). Ineffective protections for victims of breaches gives companies little incentive to work swiftly to rectify vulnerabilities.

The ambiguousness of the laws makes it difficult for the situations with breaches to get better especially where there is no accountability.

Cybersecurity must be prioritized on the highest level of an organization in order to be effective. Organizations must be willing to invest resources into strong security measures. Plachkinova, M., & Maurer, C. (2018). Security breach at Target. Journal of Information Systems Education, 29(1), 11-19. Vail, H. (2017). Cybersecurity reform in the wake of the OPM breach. Suffolk University Law Review, 50(1), 221.

Verified Expert

The solution provides the review of the article provided in the question. The solution is written in 375 words and follows APA referencing style. It has four references with in text citations mentioned. The solution is unique with no plagiarism.

Reference no: EM132066920

Questions Cloud

Describe the culture at toyota motor corporation : What could other organisations learn from Toyota's experiences and the importance of organisational culture& power?
Depreciation added back to operating cash flows : In developing the cash flow statement, why is depreciation added back to operating cash flows and to fixed assets?
Describe the considerations that you would take into account : Describe the considerations that you would take into account when selecting the menu style for an application and why. Support your response with examples.
Explain each stage of the management plan : You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists.
Write review for article - cybersecurity : Write review for this article - While media coverage of vulnerabilities in the media can present challenges, the coverage also presents awareness opportunities
Calculate the project operating cash flows : Calculate the project’s internal rate of return (IRR). Calculate the project’s operating cash flows.
Assuming bing uses sum-of-the-years-digits method : what is the depreciation expense assuming Bing uses sum-of-the-years'-digits method?
Find the rms output voltage from the detector : If a PLL FM detector receives an FM signal with a deviation of 75kHz and sine wave modulation and the VCO has a proportionality constant of 120kHz/V
Voltage across a capacitor cannot change instantaneously : In transient analysis of an rc circuit, why can't the voltage across a capacitor cannot change instantaneously?

Reviews

inf2066920

10/8/2018 2:01:27 AM

Received the solution in a well-mannered way. Thank you for the assignment. l cant ask for more from you. am so happy for all your help.

inf2066920

10/8/2018 12:17:25 AM

I believe security breaches with never be eradicated. As long as computers exist, there will be security threats. The motivation for breaches may be changing but not decreasing. In the future, attack tools will be able to better learn from its environment in order to avoid detection and more effectively exploit vulnerabilities. Current laws and regulations are so varied and confusing and provide little recourse for the victims of breaches seeking damages through civil suits. Legislation issued by Congress often focuses heavily on responding to cyber attacks rather than preventing them. Ineffective protections for victims of breaches gives companies little incentive to work swiftly to rectify vulnerabilities. The ambiguousness of the laws makes it difficult for the situations with breaches to get better especially where there is no accountability. Cybersecurity must be prioritized on the highest level of an organization in order to be effective. Organizations must be willing to invest resources into strong security measures.

inf2066920

10/8/2018 12:10:27 AM

i have to write review for this article. While media coverage of vulnerabilities in the media can present challenges, the coverage also presents awareness opportunities. Media coverage can provide awareness not only to security professional but also to those within an organization tasked with making security decisions. Budgeting for computer security can be taxing and the cost can sometimes seem expensive. Vulnerability awareness can help stress the importance of adequate security measures and hopefully lead to wise decisions regarding allocating funds for security. The media can be useful for gathering data. Sometimes media representatives and their staff may be able to contact individuals or organizations that security professionals may not be able to reach. The media can be used as a tool to widely disseminate the information among people in many different areas of knowledge.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd