Cyber Security Essay Examples

Essays on Cyber Security

How are cybersecurity workers helping the people around them? Cybersecurity workers help protect people and things like information, money, and secrets. They also help prevent attacks through their expertise and knowledge of databases, networks, hardware, firewalls, and encryption. 

The Issue of Privacy and Security and the Use of Technology to Address the Problem of Insecurity
Words • 1396
Pages • 6
Privacy and security are two phenomenons that have become subject to discussions in the recent years. A discussion about security issues cannot go on without privacy matters. The two go hand in hand. Terrorism has become a global threat to the peace and stability of a number of nations. The challenge poses security threats to countries. The problem of security has forced security agents and government institutions to develop technology that will mitigate the problem of insecurity (Economist, 2008). There…...
Cyber SecurityPrivacy
Cyber Security in the EU
Words • 574
Pages • 3
The History of cyber security in Europe as well as the rest of the world is fairly limited as the topic of cyber security and most relevant laws, legislation and regulations for it would all be from the last 15 years at least. So instead of focusing strictly on the history of legislation of the topic, this section will mostly be focused on the formation of regulatory agencies and task forces and their responses to significant cyber security events of…...
Cyber Security
Finding Dignity and Meaning Through Cyber Security
Words • 1497
Pages • 6
As technology is increasing day by day, many people who share their information online fall victim to cybercrime. Before cyber security was not a serious issue. But, now most of people who share their personal information online are complaining about getting it stolen. Cyber Security is known as a practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Beside all of these things, cyber security is also known as information security. There are five…...
Cyber Security
Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Cybersecurity Issues in Societal Perspective
Words • 446
Pages • 2
E-governance and Cybersecurity Documents issued by a country’s government provides a personal identity to an individual. Driver’s licenses, social security numbers, tax identification numbers, and various other entitlement documents are used on a regular basis by people to demonstrate their identity and authorization for various opportunities. Because these documents form the basis for all subsequent documents, their integrity is of high importance to stakeholders. Therefore, these crucial documents are targets for criminals and further cyberattacks (Conklin, A., & White, G.…...
Cyber Security
The Misconceptions of Cyber Security
Words • 1374
Pages • 6
Hacking generally has a bad representation, but hacking has shown to be very useful and beneficial to society today. The concept of hacking has been an immensely debated topic among many great scholars because of how quickly technological advancements surge today. Governmental figures are constantly revising and adding new laws to keep up with the growing technology. Although I agree that the concept of hacking has a bad representation, it is important to note that hacking has a lot of…...
Cyber Security
Dawn of Technology in Cyber Security 
Words • 455
Pages • 2
In the near future IT industry will face difficulties to cope up with cybercrimes, owing to the age old tools and outdated computer systems that rely on firewalls,antivirus softwares and tool of security. This crisis would be because the magnitude of cybercrimes and cyber security attacks have also emerged with the inclination of technology. Different kinds of online specialisations, programs and courses are being introduced by one of the best online engineering colleges. There are new types and kinds of…...
Cyber Security
Effects of Underinvestment in Cyber Security
Words • 468
Pages • 2
A lot of economic activities, military forces and most of the activities performed are highly dependent on a successful information system. This basically involves a successful network of the system involving computers. Cyber security matters are continuing to grab a lot of attention in the highest administrative positions and the communication systems used to give information to the public. The increased attention arises as a result of the potential threats which could occur due to breach of various policies which…...
Cyber Security
Cyber Security Breach in Banks
Words • 926
Pages • 4
A financial institution runs more than one servers that shop enormous quantity of records and details of diverse operations including credit score playing cards, ATMs, actual time gross settlements, ATMs and quick (the global economic messaging provider banks use to transport finances), among others. During the last few years, banks were preventing cyber-assaults like ‘dispensed denial of service’ (or DDoS), considered the most common form of cyber-assault on monetary institutions, global. Cybersecurity assaults are increased inside the banking enterprise all…...
Cyber Security
Cyber Laws and Cyber Security in South Africa
Words • 568
Pages • 3
At present the current legitimate system relating to cybercrime in South Africa could be a crossover of distinctive pieces of enactment and common law offenses relating to cybercrime are basically controlled beneath the Electronic Communications and Transactions Act 25 of 2002 (ECT Act). It has been recognized in South Africa that the current crossover legitimate system relating to cybercrimes and cyber security in specific, the common law which creates on a case by case has not kept up with the…...
Cyber Security
The Real Issue Behind Cyber-Security
Words • 1236
Pages • 5
The steady trend towards digitalization has been occurring for a long time, and as of lately, a new type of crime market has risen alongside digitalization. In recent years, companies all over the world have been affected by some form of cybersecurity issue whether that be attacks to infrastructure or momentary paralyzation of the company itself through the exploitation of security measures. Over the years the number of attacks all around the world has increased exponentially with many more cyber-attacks…...
Cyber Security
Cyber Security Challenges in Pakistan
Words • 1695
Pages • 7
The growth of technology and dependency on cyberspace offers valuable and essential services for human life’s functionality and the environment as well as the challenges and threats. Cybersecurity is a field that emphasizes protecting computers, servers, information, programs, and networks from unauthorized access, any change or destruction. Cyber Security involves the protection and safeguard of the rules of cyberspace, which requires adequate knowledge for the limitation, counter-attacks, and vulnerabilities of ICT, and should know how to improve the critical operating…...
Cyber Security
Problem of Cyber Security and Terrorism
Words • 2248
Pages • 9
Cyber security and terrorism is a serious threat to today's global society. The different ways it has improved from being small attacks to large attacks. The ways it has affected the global society and places like the United Kingdom and the NHS. There are different ways you can go about trying to solve and prevent future attacks and what to do if you are part of a attack. Cyber security and terrorism has a long history behind it; especially when…...
Cyber SecurityTerrorism
Digital Technology and Privacy Erosion
Words • 2872
Pages • 12
Introduction Defining Privacy and Information Privacy Privacy was once defined by Warren and Brandies (1890, pp.193) as ‘the right to be let alone’, which means a physical person. Yet, this does not quite fit the information age people live in today. People still value their privacy and they like to protect their personal lives from others they choose not to share it with. However, with digital technology advancement, people’s information privacy has become threatened. Furthermore, control over their personal information…...
Cyber SecurityDataInternetInternet Privacy
What Is Online Privacy and Why Does It Matter?
Words • 550
Pages • 3
Is your life really private? Is anyone tracking your activities? Or what about your smartphones or other smart devices that you use daily? It all narrows down to one main question, is the Internet really safe in terms of privacy? No, it isn’t. We share our personal data without even knowing it. For example, take everyone’s favourite search engine, Google. Your data and activities are tracked and stored. Even Whatsapp, Facebook and Instagram are not safe at all. These three…...
Cyber SecurityDataInternet Privacy
CIA-Security Triad for Medical Data Integrity
Words • 673
Pages • 3
CIA trio that stands for Confidentiality-Integrity-Availability has a eminent role in protecting a system for data breaches, malicious threats and vulnerabilities. Data integrity by definition means assuring the consistency and accuracy of data in its entire lifecycle. In this paper, I'm vigilant on exploring the data integrity breaches in Medical field and how data integrity should be maintained in order to avoid any kind of data attacks. An Electronic Health Record (EHR) system must enable productive accessibility of critical, precise…...
Cyber SecurityHealth CareIntegrity
In-App Protection and Security for Gaming Apps
Words • 1205
Pages • 5
Online games have incrementally improved over the last period until they became one of the vigorously entertainment business, knowing that key factors that supported the evolution of the video games is the broadband Internet wide connections. Even though the Internet is the main reason for the online games to be thriving, it is at the same time the reason that threaten the online gaming applications and make them exposable to some types of attacks. Since the services provided by the…...
Cloud ComputingCyber SecurityGamesInternetVirtual Games
Manufacturing – Cyber Security Risk
Words • 788
Pages • 4
We have come a long way since the late 18th century after the first industrial revolution[1]. Mechanical tools were introduced to the masses which replaced conventional manual labour and working animals. Since then, it had spurred people throughout the ages to improve our manufacturing processes and led to the subsequent industrial revolutions. Now, the boom of technology in the 21st century heralded the fourth industrial revolution aka smart manufacturing. By utilizing technologies such as internet of things (IOT) and artificial…...
Computer securityCyber SecurityManufacturingSecurityTechnology
Malware Techniques – Cyber Security
Words • 1919
Pages • 8
With the recent breaches in network security, it has drawn a lot of attention to network security concerns. As technology expands at a rapid rate, it is important to protect the information as well as the individuals dealing with the networks. Moreover, society is constantly living in fear of the devastating effects of hackers' actions. To keep the operating safe there are methods on maintain computer operating systems, such as protecting against network attacks, malware removal techniques, and establishing security…...
Computer NetworkingComputer securityComputer VirusCyber SecuritySoftwareTechnology
Cybersecurity and the Internet of Things
Words • 1030
Pages • 5
INTRODUCTION Over the past years, an increase in cyber-attacks has become a severe social problem. The internet has become a fast way of communication between family, friends, organizations amongst many others. With that, criminals have become more adaptable to increase their ability to cause harm. Cyber security has become extremely vulnerable to humans, businesses that facilitates any person with access to the computer or any technology with the intension to cause harm. The rise of new technologies like cryptocurrency and…...
Computer securityCyber SecurityInternet SecuritySecuritySocial MediaTechnology
Cyber and Network Security: Definition & Best Practices
Words • 2098
Pages • 9
INTRODUCTION Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network. Network security combines multiple layers of defences at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious…...
Computer NetworkingComputer securityCyber SecurityNetwork SecurityTechnology
Introduction to Cyber Security
Words • 2003
Pages • 9
Top five Cyber security breaches in last five years: 2014: The most dangerous attack in 2014 was done on eBay which is,one of the top most shopping cart and here you can find more thingsthan Amazon. In February and March 2014, about 145 million usersencrypted accounts and passwords along with other personalinformation was stolen from eBay . This was unknown until eBayrequested their 145 million users to change their credentials. For thishack social engineering was used the passwords were not…...
Computer NetworkingComputer securityCyber SecuritySoftwareTechnology
Threats of Cyber Security and Challenges for Pakistan
Words • 1328
Pages • 6
Nature of Threats Cybercrime arrives in an assortment of structures extending from disavowal of administration assaults on sites to burglary, coercing, blackmail, control, and obliteration. The devices are numerous and changed, and can incorporate malware, emancipate product, spyware, social designing, and even modifications to physical gadgets (for precedent, ATM skimmers). The main concern is: nearly anything controllable by innovation will have a feeble spot. As of late, it has been seen that everything from autos (Greenberg 2015) to therapeutic gadgets…...
Computer securityCyber SecurityGovernmentPakistanSecurityTechnology
Cambodia: A New Emerging Market
Words • 709
Pages • 3
Cambodia, a new emerging market among lower middle-income economies in the region, has enjoyed its growing middle class of young active populations who are quite inceptive to new trends of culture and technology, in particular, the use of cyberspace in this digital era. The government, acquainted of the situation, has put forth in its Industrial Development Policy 2015-2025, with emphasis on ICT as a driving factor towards the realization of its shift from agricultural to industrial based economy (World Bank…...
Computer securityComputersCyber SecurityPolicyTechnology
Cyber Security via Fingerprint Scanner Using Microcontroller
Words • 1409
Pages • 6
Biometric Smart Attendance Kit With Fingerprint Scanner Using Microcontroller The register based conventional attendance system for the students in our educational institution is laborious, time consuming and kind of boring task for the educators. An intelligent system based on fingerprint scanner have been designed and implemented that supplanted the traditional mundane attendance system. The system can acquire, store, crosscheck the fingerprint of individuals and export the data in the form of Microsoft excel spreadsheet in a memory module. The entire…...
Cyber SecurityTechnology
Role of Information Security Officer in Cyber Security
Words • 1704
Pages • 7
The Essential Body of Knowledge As a matter of record, it is widely known that information security is critical to all organizations to protect their data and continue operating. Information security is defined as the protection of information, the system, and hardware that use, store and transmit that information. The four important jobs that Information security performs for an organization are to protect the organization's ability to continue operations, to enable the safe operation of applications implemented on the organization's…...
BusinessCyber SecurityInformationManagementPolicyTechnology
How Technological Advancement Is Going To Affect Us?
Words • 1606
Pages • 7
Is the advancement of technology doing more harm than good? Cyber hackers, cyber-terrorist, thieves, these are all words used to describe the people that have used their internet maneuvering abilities to compromise so-called “Trusted” sites. Patents rights, classified information, and personal informations are all words used to describe the information that is being hacked. Privacy is the word be targeted in this technological age. Not only is it being targeted but it is being demolished by social media sites, company’s,…...
Cyber CrimesCyber SecurityEdward SnowdenIndustryInternet PrivacyPrivacy
DoS Attack and Cyber Security
Words • 755
Pages • 4
A DDoS attack against the Universities Registration System Server (RSS) by infected computers (Bots) located in the University Computer Labs (see diagram) resulted in shutting down access to the RSS system. Orchestrated and controlled by a central controller these Bots established web connections (HTTP protocol) to the RSS using up all available bandwidth. Doing so prevented other users from accessing the Web site/server for legitimate traffic during the attack. This is considered a Consumption of Resources attack using up all…...
Cyber Security
Password Protection as a Part of Cyber Security
Words • 415
Pages • 2
Today, everyone is having online banking account and  e-mail account . Safety is an important aspect. If some intruder steal our password, then we have to pay high price for it. So protecting password is a significant factor for each and every one in this e-world. This speech provides mechanism to protect our online password. Choosing a Good Password Your password is what tells the computer that you are who you say you are. Until we can do retina scans…...
Cyber SecurityTechnology
Cyber Stalking and Cyber Security
Words • 633
Pages • 3
Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, and damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. The definition of "harassment" must meet the criterion that a reasonable person, in possession of the same information, would regard it as sufficient to cause another…...
CyberCyber SecurityIdentity Theft
Cyber security threats
Words • 1393
Pages • 6
Cyber threats are constantly evolving thus increasing the need to hedge and tighten the security measures to ensure that one is protected while using the cyber space. Cyber threats are made more complex especially due to the increasing globalization and use of cyber space in most of the parts in the world. This has caused a major security threat which calls for better security measures installation to counter some of the threats which are well organized by some individuals. Some…...
CyberCyber SecurityData
Internet – Cyber security
Words • 566
Pages • 3
The internet is no man’s land. The whole world has been melted into a global village as the Internet pervades the homes, offices and even phones. The internet has become closer to our thoughts and feelings every day as chat engines can now express feelings and depict thought patterns. Information about self, plan of work, career, and family are also speedily available and sent via the internet. Most, if not all, companies own a website where the clients/customers can access…...
Cyber SecurityInternet SecurityTechnology
Cyber Security at Richman Investments
Words • 767
Pages • 4
Overview To stop malware problems from occurring at Richman Investments Protecting Richman investments employees, partners and company from illegal or damaging actions by individuals either knowingly or unknowingly Internet /intranet/ extranet related systems including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, www browsing, and FTP, are the property of Richman investments. These systems are to be used for business purposes in serving the interests of the company and of our clients…...
Cyber SecurityInvestmentTechnology
Cyber Security With Automated Monitoring Attendance System
Words • 2418
Pages • 10
The problem and its scope In this paper we propose a system that automates the whole process of taking attendance and maintaining its records in an academic institute. Managing people is a difficult task for most of the organizations, and maintaining the attendance record is an important factor in people management. When considering academic institutes, taking the attendance of students on daily basis and maintain the records is a major task. Manually taking the attendance and maintaining it for a…...
Cyber SecurityTechnology
Cyber Security India
Words • 5898
Pages • 24
•After China and the U.S., India has the highest number of Internet users. There are also an estimated over 381 million mobile phone subscriptions with Internet connectivity. In the list of online infection risk India ranks 9th and in personal computer across the globe, India ranks 7th. •A recent survey by McAfee named India next to Brazil, Romania and Mexico the least able to defend against cyber attacks. •Cyber security threats and hacking attempts in India rose to 22,060 in…...
CyberCyber SecurityIndia
We've found 34 essay examples on Cyber Security
Prev
1 of 1
Next

Cyber Defense Methods

We are helping the world by protecting technology, banks, secrets, and information from malicious people. Therefore, I am researching what type of defense methods cybersecurity workers use as their techniques and strategies.

In the article “Cyber Defense Triad for Where Security Matters.” The article discusses approaches to cybersecurity and the lack of a trustworthy system to protect the security of networked computer simultaneously in mandatory access control policy, protection against subversion, and verifiability. Topics include the U.S. spending on information security. It also talks about the requirements of a trustworthy operating system to build security for cyber systems, and the cost and time required to build and evaluate a high-assurance security kernel. It says that “The security problem will remain as long as manufacturers remain committed to current system architectures, produced without a firm requirement for security.” This is interesting because to me it says that there will always be a need for cybersecurity workers. It also talks about types of attacks, like malware, which I find interesting, It says, “Even worse, a witted adversary has numerous opportunities to subvert or sabotage a computer’s protection software itself to introduce insidious new flaws.“ Malware is used in most attacks here; “ This is an example of “malware,” a preferred attack for many of the most serious breaches.”

Security and Cyber-Espionage

The next article I read was “The myths and facts behind cybersecurity risks for industrial control systems.” The article talks about how cybersecurity first started. It shows what is real and fake about threats when dealing with cybersecurity. While talking about cybersecurity, the article asks the question “How are they getting in?” It says that not only can they get in via internet but they can use database records and viruses in programs. The statement, “cyber attack need to be considered in the design of not just the control systems”, is interesting to me because it talks about cybersecurity. In the article it states “Furthermore, most organizations are highly reluctant to report security incidents as they are viewed as potential embarrassments.” It also says, “ In fact, many organizations have denied that there even is a risk to industrial systems from cyber attack.” To me, this is saying that companies are afraid of saying they are having security problems because it will not only be embarrassing but can also scare off customers. For example, if I was a big bank with a lot of people who were supporting the bank, releasing to the public that we have security issues will make people feel like their money is not safe and will want to close their bank accounts. This is an excellent example of why cybersecurity is very important for normal people and companies. The hacking community is increasing. Therefore, the situation is likely to get worse.

In the article “Cybersecurity in the Smart Grid: Survey and challenges”, the article talks about how The Smart Grid is considered a revolutionary and evolutionary regime of existing power grids. The Smart Grid is expected to greatly enhance efficiency and reliability of future power systems with renewable energy resources. The article states “Along with the salient features of the Smart Grid, cyber security emerges to be a critical issue because millions of electronic devices are interconnected via communication networks throughout critical power facilities, which has an immediate impact on the reliability of such a widespread infrastructure” which to me shows why it is important to have cyber security banks, websites, and company computers. To me, this says that if the smart grid were to be hacked all the devices interconnected with it can also be hacked along with it.

In the article, “Exclusive: Operation Shady RAT—Unprecedented cyber-espionage campaign and intellectual-property bonanza”, it talks about a high-level hacking campaign called Shady Rat. It says that Shady Rat has hacked computers in 14 different countries, affecting around 70 people from governments, nonprofits, and other organizations. Shady RAT has been stealing valuable property including government secrets, e-mail archives, legal contracts, and other things from more than 70 public and private-sector organizations. The article states that “for at least five years, a high-level hacking campaign, named Operation Shady rat, has infiltrated the computer systems of national governments.” The reason why this is so interesting is that it shows how important security is. It also says that “operation Shady RAT has been stealing valuable intellectual property (including government secrets, e-mail archives, legal contracts, negotiation plans for business activities, and design schematics) from more than 70 public- and private-sector organizations in 14 countries.” this is a major problem because our government’s secrets and personal info can be released or viewed by hackers anytime, which can be used for ransom. It has been going on for more than five years, and it still has not been stopped. This article explains about cybersecurity by show what high-level hackers are searching for or the reason they are hacking things like the government’s e-mail archives. This may also show what you should protect more online.

Cyber Attacks Modelling

In the article, “Modeling multistep cyber attacks for scenario recognition”, it talks about making a replica of a cyber attack. This article also describes what sets off security alarms, like intrusion detection sensors, integrity checkers, and firewalls. Integrity checks are a sensor that will go off if something is moved or changed without administration access or an unscheduled trigger. The article states that “developing attack models for multi-step attack scenarios could be quite time-consuming.” This shows that even though developing attack models take a lot of time, they still do it because safety is very important. It also says, “Our discussion of attacks and attack steps is guided by the following key definitions” which shows the way they set up an attack model and the steps it takes to make. Additionally, it states “An attack modeling language must be able to express the knowledge compiled in the modeling tasks described above” meaning a test attack must be able to do and explain the steps like identify logical attack methods that a normal attack would use.

For my interview, I interviewed someone named Jonathan V. I interview Johnathan by phone. I asked him a set of 10 questions. First I asked him to describe his responsibilities he told me that he is responsible for the network and computer security. He is also responsible for troubleshooting and installing programs. I asked him other questions, like his educational background and the degree it takes to be a security systems engineer. He told me that he attended the University of Maryland, he also said that his job requires a Bachelor’s but some jobs accept Masters. One of the questions I made for him was “Do you ever think that you wish you could have done something other than cybersecurity?” in which he replied “ No, I was always into technology growing up. If not cybersecurity I probably would have chosen something with computers anyway. ” I asked him how many years he attended college, and he told me five years, but you only need to go for 4. I asked him other things like how long has he been employed at his workplace and he told me he has only been there for around a year. I asked him to Describe a problem, issue or need he has observed in this industry. He told me that sometimes communication could be an issue when something doesn’t go the right way. If something bad happens, we need fast responses so everyone can understand what’s happening.I also asked what are some challenges you have when working with cybersecurity and he told me that some people try to hack him or mess with them just for fun or to cause mayhem.

This interview helped me understand more about cybersecurity workers and the problems and challenges they face as well as the things it takes to become one. He told me a little about everything like the responsibilities and the things you can expect being cyber security worker. Reading my articles also showed me how important cybersecurity could be as well as how an attack can be conducted in many ways with and without internet. Therefore I believe that cybersecurity workers are helping out the world around them physically and digitally, by giving everyone protection over their digital valuables and other important items.

Education and Programming

After reading the essays I came to the conclusion that I wanted to make my topic about an anti-virus. I wanted to make a real program that will actually work, can be downloaded and used, and will protect the computers from viruses and other malicious attacks. First, I researched what a normal anti-virus has and what it doesn’t have so that I could add to it or improve the already thought of features. I had my own ideas to add to the program which would make it unique. I decided to code my program in a application called”Visual Studios” which is a program made by Microsoft for the development of other programs. I mainly researched old viruses and how they operated to understand how to prevent against them. A well known virus that I researched is known as “WannaCry-Ransomware”. The virus spreads to computers and demands money or else it will delete all important files. Due to me having a computer and having a passion for technology, researching how to prevent my technology from slowing down, being broken, or locked, was very common. I also live in a household with people who don’t know how to fix their own technology and are constantly asking me for help.

I knew there are many different ways computers can be attacked and I wanted to cover all bases. That is why I also researched how in person attacks work and thought of how I could fight off the attacks. I figured that I could make the computer detect such attacks by checking the typing words per minutes. I also made the program be able to disable certain programs that could be considered too powerful. After I figured out how I wanted my anti-virus, I started sorting out the features from most to least important. Once I figured out what was most important, I started making the program and only thinking about my end goal. When I started, the visual aspect wasn’t on my mind as much as functionality. My first build only had one feature and it looked visually ugly. I was still happy it worked as intended and then started to add more features and changed the design completely. My most recent build looks extremely good and very professional.

I started to take a log on each program build. I also started taking videos and pictures of the program itself. I wanted to implement a license-key system and upon researching how to do so, I found that I would need to use a web host to keep the information of what codes work and what codes have been used. I used a website I had previously created as a web host. Once I set up the license-key system, it took little to no time to test on other machines. I had an issue where you could use the same key more than once, but it was an easy fix. Programming overall was not a hard task but from time to time my mind did drift and I took breaks. I personally believe that this can be a good solution to my engineering problem. Not only does it protect computers for big companies and even personal uses, but it is also unique by having features that other antivirus softwares don’t offer. I hope to one day get my program patent and possibly start my own company.

My future plans with the program consist of adding additional features as well as upgrading the old ones, changing how the program looks to be visually stunning to the customers and competition, and gathering customer suggestions. Once I gather suggestions and understand the every-day customer’s needs, I will be able to make a fully-function program that can be marketed and sold to anyone. Once I believe the program is worth real money, I will try to start my own cooperation or partner up with a company and hopefully work my way through the ranks. I hope to be the “new face” of protection when it comes to cyber security and become a well known anti virus provider such as Norton, Avast, and even Malwarebytes.

Conclusion

This project has taught me about time management, professionalism, and other important skills. I have also gained knowledge from the articles I chose in my project and have learned about many things such as pen testing and attack defense. I know there is still a lot to learn, and a long way to go but I believe I can be successful if I put an effort into it. I was inspired to make my own program by many friends who have done so themselves. I hope to impress anyone who I present my project to as well as use it in my future life and career.

FAQ about Cyber Security

What Is Online Privacy and Why Does It Matter?
...Fun fact: Windows 10 is not secure. Seriously, it’s not privacy-free. Microsoft collects your data which includes your contacts, interests, basically your identity. Cortana does the same as well. It collects data mainly on your search and microphon...
How Technological Advancement Is Going To Affect Us?
...Finally, with constant posting of locations, pictures, family members, phone numbers and such on social media and business pages, we voluntarily lessen our privacy and put ourselves in danger for stalkers and thieves. These acts already reveal the pr...

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment