Access Millions of academic & study documents

Cyber threats and vulnerabilities

Content type
User Generated
Showing Page:
1/9
Running Head: CYBER THREATS AND VULNERABILITIES 1
Cyber Threats and Vulnerabilities
Student’s Name
Institutional Affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/9
CYBER THREATS AND VULNERABILITIES 2
Cyber Threats and Vulnerabilities
The world today is in a major transition today as we are continuously evolving. The
information technology is growing at much a higher rate than it was a few decades ago. Its
incorporation in the business landscape has facilitated most of the companies going globally.
There has been growth and increase in cloud connectivity with most companies connecting to
dozen of cloud services and data across the globe. As a result, cyber threats have become more
viral, diverse and interconnected than they have been ever before. In some cases the attack aims
at intrusion into private networks in order to access the sensitive information that is diplomatic
economic or military in nature. The destruction after the attacks is imperceptible, dormant, and
progressive (Cordesman, 2002).The business environment is now compelled to have an
intelligence community in order to promote the collaboration among the various experts in that
field. It is important to face the challenge since the trend in the cyberspace and the response that
the actors make will influence the business course in the near future.
The Financial Industry Regulatory Authority (FINRA) opts that the firms takes the
necessary steps to counter the cyber security related threats that they face. The topmost three
threats that attack the organization include hacker penetrating firm systems, insider
compromising firms, and operation risks. The hackers are involved in manipulation of accounts
and data destruction and defacement. Operation risk poses the threat of environmental problems
such as power failures or natural problems such as hurricanes (Cordesman, 2002).The insider
compromising firms are involved in malicious activities such as accessing information that is
sensitive if left in hands of the public. The criminals use pretexting to trick people into giving out
their information that is personal through installing malicious software in their devices. Fake
antivirus if stored in a computer give a remote access of information stored. Phishing is also an

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/9

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 9 pages?
Access Now
Unformatted Attachment Preview
Running Head: CYBER THREATS AND VULNERABILITIES Cyber Threats and Vulnerabilities Student’s Name Institutional Affiliation 1 CYBER THREATS AND VULNERABILITIES 2 Cyber Threats and Vulnerabilities The world today is in a major transition today as we are continuously evolving. The information technology is growing at much a higher rate than it was a few decades ago. Its incorporation in the business landscape has facilitated most of the companies going globally. There has been growth and increase in cloud connectivity with most companies connecting to dozen of cloud services and data across the globe. As a result, cyber threats have become more viral, diverse and interconnected than they have been ever before. In some cases the attack aims at intrusion into private networks in order to access the sensitive information that is diplomatic economic or military in nature. The destruction after the attacks is imperceptible, dormant, and progressive (Cordesman, 2002).The business environment is now compelled to have an intelligence community in order to promote the collaboration among the various experts in that field. It is important to face the challenge since the trend in the cyberspace and the response that the actors make will influence the business course in the near future. The Financial Industry Regulatory Authority (FINRA) opts that the firms takes the necessary steps to counter the cyber security related threats that they face. The topmost three threats that attack t ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4