Monday, August 12, 2019

OLINE SECURITY Essay Example | Topics and Well Written Essays - 2500 words

OLINE SECURITY - Essay Example High intensity of network attacks has pushed organizations to invest in more secure systems that can resist external attacks and limit access of organization resources. However, cybercriminals use a broad range of techniques to attack networks including use of Trojan programs, fishing mails, and indirect attacks. Although various approaches to guarantee online security are available, there is evidence that cybercrime is still a challenge that information systems have to address. A close analysis of the problem of cybercrime shows that the problem has become severe and needs immediate remedy. For instance, in the UK, the banking sector loses approximately  £1 billion to cybercrime and customer trust is at stake in this sector (Barclays, 2013). The banking sector is a major contributor to the economy of the country contributing about 8% of the UK Gross Domestic Product, but now falls under great threat from cybercriminals. According to United States Department of Crime and Justice, (2013) about 5 million Americans are hacked every year and their identity information is used and at least $50 million dollars is lost to cyber-criminals. In China, Anderson reports that in China, over 700,000 web users fall victim of cybercrime every without their knowledge and over $874 million is lost to fraudsters. Despite the imperative efforts that have been engaged to tackle the problem, cybercrime continues to be a big problem in many countries. The 2013 cybercrime report presented by Sophos new cyber threats have brought new trends in online business. This report indicates that Blackhole is a new malware that has heightened the problem of cybercrime. Surprisingly, US host over 30% of the Blackhole sites while China hosts over 5% of these sites. These trends indicate that there is a need for stricter policies to curb cybercrime in the business market. Hackers are people who exploit weaknesses within computer

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.