Posted: September 9th, 2022
COVID19 and Cyber Security
Cyber Security
COVID19 and Cyber Security
The United States Health and Human Services Department has recently suffered cyberattacks in its main systems. Recently, the main websites issuing information on the progress of the covid-19 virus have been under security threat from hackers who seek to add, delete and modify information on the disease that could cause chaos and panic in the country. There have been speculations that this cyber-crime activity may have been the act of a foreign enemy whose intention was to cause chaos in the country and emanate misinformation on the ongoing corona virus pandemic with the aim of undermining response to the disease (Okereafor and Adebola 2020). The attacker is said to have overload the HHS system with several hits for hours without success. It has been noted with concern that various terrorists are taking advantage of the situation in the United States when the country is at its weakest and using the opportunity to take on its cybersecurity (Jouini, Rabai and Aissa 2014). During this time, people have become completely dependent on the internet not just to work but also to seek information on the covid-19 virus. Asa result cyber criminals are spreading false information on a cure and trying to pose as sellers for the treatment of the viral disease. They are also using this opportunity to insert malware into online resources and especially those consists of information about the virus so that they can hack into individual accounts, websites and other online accounts. As a result, the government has put measures in place to ensure that their missions are not successful. It has put up firewalls that prevent the hacking of sites that are critical to issuing information on the progress of the virus.
Tribe of Hackers
The Tribe of Hackers refers to information that has been collected over the year through interviews from the best hackers in the world. The book consists of information that has been gathered through the knowledge of some well-known hackers while it consists of others whose names came to be known after the publishing of the book. The book is entrenched into information on cybersecurity. Following up on the experience of over seventy top hacker it consists of tips and information revolving around the concept of cybersecurity. It presents the interviews of these experts who have been asked the same group of questions. The main aim of the book was to get insight on how the mind of a hacker operates and what can be learnt of cybersecurity from this knowledge (Hartley 2006). By understanding the strengths, weaknesses, procedures involved in the hacking process then the reading gets a better insight into the would of cyberterrorism and how it can be stopped through the use of information of those who have the ability to hack information systems. Apart from providing tips, it has a unifying effect on the cyber community and create a platform of engagement where a positive impact can be felt through the industry (Carey and Jin 2019). It opened up the inside world of cybercrime and shed light on how it goes on, on a day to day basis. It spreads the message of the importance of sharing information showing that together cyber terrorism can be stopped in the society. Apart from unifying the cyber community, the reading reflects on a positive side of the sector showing that some people are not there for malicious intent but for the good of it. It tries to show a flip side of hackers that has not been experienced before.
Cybersecurity
Cybersecurity are procedures that are implemented in an organization in a bid to protect their systems from any cyber risks. This may be to protect data or even hardware from malicious attacks. In the current world, there is a lot of reliance on the internet and information that is spread through it. Hackers have taken advantage of this age of technology to look for loop holes through which they can conduct cyber crime activity with malicious intent. It is during this era of internet use that malicious attackers have taken to hack important systems. They pursue hacking with either a political or an economic (Abomhara 2015). There have been various cases of hacking in recent years where hackers make attempts to access information that is unauthorized or paralyze system and demand reimbursement before they can allow access to it. It is important that governments become more sensitive to cyber security especially in these times where the activities have increase due to an increased use of the internet. Cyber terrorists normally target commonly sued systems in order to ensure that they cause a paralysis of daily services. Through implementation of cybersecurity it is possible to overcome cases of cyber terrorism (Shafqat and Masood 2016). In the future, governments and institutions will have to change the system so that it is not familiar to cybercriminals and upgrade their cybersecurity procedures to ensure that this does not occur again. It is also vital that they implement measures to prevent hackers from having an easy time accessing critical information systems.
References
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.
Carey, M. J., & Jin, J. (2019). Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World. John Wiley & Sons.
Hartley, R. D. (2006). Ethical Hacking: Teaching Students to Hack. INFOSEC Homework help – Writers, November, 5.
Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of Security Threats in Information Systems. ANT/SEIT, 32, 489-496.
Okereafor, K., & Adebola, O. (2020). Tackling the cybersecurity impacts of the coronavirus outbreak as a challenge to internet safety. Journal Homepage: http://ijmr. net. in, 8(2).
Shafqat, N., & Masood, A. (2016). Comparative analysis of various national cyber security strategies. International Journal of Computer Science and Information Security, 14(1), 129.
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
COVID19 and Cyber Security