Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: September 9th, 2022

COVID19 and Cyber Security

Cyber Security

COVID19 and Cyber Security
The United States Health and Human Services Department has recently suffered cyberattacks in its main systems. Recently, the main websites issuing information on the progress of the covid-19 virus have been under security threat from hackers who seek to add, delete and modify information on the disease that could cause chaos and panic in the country. There have been speculations that this cyber-crime activity may have been the act of a foreign enemy whose intention was to cause chaos in the country and emanate misinformation on the ongoing corona virus pandemic with the aim of undermining response to the disease (Okereafor and Adebola 2020). The attacker is said to have overload the HHS system with several hits for hours without success. It has been noted with concern that various terrorists are taking advantage of the situation in the United States when the country is at its weakest and using the opportunity to take on its cybersecurity (Jouini, Rabai and Aissa 2014). During this time, people have become completely dependent on the internet not just to work but also to seek information on the covid-19 virus. Asa result cyber criminals are spreading false information on a cure and trying to pose as sellers for the treatment of the viral disease. They are also using this opportunity to insert malware into online resources and especially those consists of information about the virus so that they can hack into individual accounts, websites and other online accounts. As a result, the government has put measures in place to ensure that their missions are not successful. It has put up firewalls that prevent the hacking of sites that are critical to issuing information on the progress of the virus.

Tribe of Hackers
The Tribe of Hackers refers to information that has been collected over the year through interviews from the best hackers in the world. The book consists of information that has been gathered through the knowledge of some well-known hackers while it consists of others whose names came to be known after the publishing of the book. The book is entrenched into information on cybersecurity. Following up on the experience of over seventy top hacker it consists of tips and information revolving around the concept of cybersecurity. It presents the interviews of these experts who have been asked the same group of questions. The main aim of the book was to get insight on how the mind of a hacker operates and what can be learnt of cybersecurity from this knowledge (Hartley 2006). By understanding the strengths, weaknesses, procedures involved in the hacking process then the reading gets a better insight into the would of cyberterrorism and how it can be stopped through the use of information of those who have the ability to hack information systems. Apart from providing tips, it has a unifying effect on the cyber community and create a platform of engagement where a positive impact can be felt through the industry (Carey and Jin 2019). It opened up the inside world of cybercrime and shed light on how it goes on, on a day to day basis. It spreads the message of the importance of sharing information showing that together cyber terrorism can be stopped in the society. Apart from unifying the cyber community, the reading reflects on a positive side of the sector showing that some people are not there for malicious intent but for the good of it. It tries to show a flip side of hackers that has not been experienced before.

Cybersecurity
Cybersecurity are procedures that are implemented in an organization in a bid to protect their systems from any cyber risks. This may be to protect data or even hardware from malicious attacks. In the current world, there is a lot of reliance on the internet and information that is spread through it. Hackers have taken advantage of this age of technology to look for loop holes through which they can conduct cyber crime activity with malicious intent. It is during this era of internet use that malicious attackers have taken to hack important systems. They pursue hacking with either a political or an economic (Abomhara 2015). There have been various cases of hacking in recent years where hackers make attempts to access information that is unauthorized or paralyze system and demand reimbursement before they can allow access to it. It is important that governments become more sensitive to cyber security especially in these times where the activities have increase due to an increased use of the internet. Cyber terrorists normally target commonly sued systems in order to ensure that they cause a paralysis of daily services. Through implementation of cybersecurity it is possible to overcome cases of cyber terrorism (Shafqat and Masood 2016). In the future, governments and institutions will have to change the system so that it is not familiar to cybercriminals and upgrade their cybersecurity procedures to ensure that this does not occur again. It is also vital that they implement measures to prevent hackers from having an easy time accessing critical information systems.

References
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Carey, M. J., & Jin, J. (2019). Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World. John Wiley & Sons.
Hartley, R. D. (2006). Ethical Hacking: Teaching Students to Hack. INFOSEC Homework help – Writers, November, 5.
Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of Security Threats in Information Systems. ANT/SEIT, 32, 489-496.
Okereafor, K., & Adebola, O. (2020). Tackling the cybersecurity impacts of the coronavirus outbreak as a challenge to internet safety. Journal Homepage: http://ijmr. net. in, 8(2).
Shafqat, N., & Masood, A. (2016). Comparative analysis of various national cyber security strategies. International Journal of Computer Science and Information Security, 14(1), 129.

Order | Check Discount

Tags: COVID19 and Cyber Security

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.