Description
Will need the topic in the next 48 hours.
You are required to write an 8-10 page research paper on a topic of your choosing, related to the course concepts. The annotated bibliography must include at least three of the references you will use in your paper, written in APA style, with each one followed by a brief description of the reference. To submit your assignments cut and paste any text into the Submission Text box, attachments are not available except for the research paper. This is for ease of grading on my part, Sakai does not handle attachments well.
Explanation & Answer
Hi, kindly find attached
Running Head: CYBER RISKS
1
Cyber Risks by Employees
Student’s Name
Institution
Date
SECURITY IN I.T
2
Introduction
The world we live in is one who has experienced a lot of redefinitions and revolutions in some
areas. One of those areas is the technological area, and it is only rational to say that a lot of
strides have been made in this area. It is also important to acknowledge the fact that even on
technological aspects like the internet, there still exists some risks. These risks can be termed as
cyber risks, and they come in some agents (International Conference on Information Technology
& Latifi, 2018).
This paper will aim to narrow down on how employees could be the very threat to cybersecurity
and confidentiality while at the same time underlining the fact that this could happen
intentionally or even unintentionally depending on the circumstances.
As mentioned in the introduction, the world we currently exist in is one which is run by a great
deal through the internet. This means that time, and again there can always be attacks on systems
because of either weak firewalls or even unintended carelessness on the side of the people who
are mandated to run these very systems.
One of the reasons as to why there have been a lot of cyber-attacks and hence looming cyber
risks even on systems belonging to the Homeland securities is because of the recklessness and
carelessness on the employees who are supposed to be running these systems (In Antipova, In
Rocha & International Conference on Information Technology Science, 2018).
Among many other ways, this is how employees could be the source of cyber risk to an entire
system;
•
Acting from inside
•
Having poor passwords
SECURITY IN I.T
•
The availability of weak access policies
•
Through unprotected downloads
•
Through Phishing and social engineering
•
Through unprotected data and emails.
3
All the points mentioned above will be discussed and in details in the next part of this paper in
order to shed more light on how the employees are working for a given organization, could be
the very source of insecurity to the Technological systems that are in place. At the same time, it
will also be made clear on all the related optics.
Acting from Inside
This is one of the main factors that has always made some employees to be the agents to cyber
insecurity in their organizations. This happens in the sense that employees who have access to
the most sensitive of information and data are contacted by hackers and malicious elements and
either convinced or coerced into being moles, not their organization.
When it so happens that the employee agrees to act in the interest of the malicious parties, they
may go a very long way to compromising the security of the systems belonging to the
organizations they work for and what this translate to is them being the loophole for cyber
insecurity at the end of the day (Communications Security Establishment (Canada) & Canadian
Centre for Cyber Security, 2018).
It is however of utmost importance to underline the fact that this factor can eit...