Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

HLSC710-DISCUSSION 1-REPLY 1

HLSC710-DISCUSSION 1-REPLY 1

The response must be 200 words and use at least 2 scholarly citation(s) in APA format. Any sources cited must have been published within the last five years. Acceptable sources include texts, articles, presentations, the Bible, blogs, videos, etc.
Textbook:
Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare.Boca Raton, FL: CRC Press. ISBN: 9781482239225.
Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.

COURTNEY

Cyber Event
  Cyber-attacks occur daily and are constantly evolving. In the past quarter century alone, cyber attacks have evolved from tiny hacks created by high-school students to state-sponsored attacks compromising presidential elections (Rid & Buchanan, 2016). Cyber-attacks can be conducted by either an insider or outsider source. One example of an insider cyber-attack occurred between 1976 and 2006. For over 30 years Greg Chung of Boeing stole over two billion dollars’ worth of aerospace documents and gave them to China (Uma & Padmavathi, 2017). During the investigation, over 225,000 pages of sensitive material were recovered in Chung’s home. This cyber attack is considered one of the largest insider attacks in history with malicious intent to supply China with proprietary military and spacecraft intel (Uma & Padmavathi, 2017).
Top Cyber Threats
  There are multiple cyber threats that we face today. The top three cyber threats we are facing today are social engineering, ransomware, and third-party software exposure. Social engineering attacks exploit social interactions to gain access to valuable data. With social engineering, cyber criminals’ trick and manipulate their targets into taking certain actions, such as bypassing security measures or disclosing certain sensitive information (Rid & Buchanan, 2016). Ransomware attacks infect networks and hold data and computer systems hostage until a ransom is paid.Ransomware is among the top 10 cyber-attacks and is a popular way for attackers to target businesses (Rid & Buchanan, 2016). Lastly, many retailers use third parties for services such as payment processing.Even if a company does not directly handle personal information, including social security numbers or credit card numbers, a third party can put them at risk. With malware, hackers can steal data through third-party vendors, as they did in the Target malware attack in 2013 (Rid & Buchanan, 2016). Furthermore, significant changes have occurred in the realm of cyber security from the inception of cyber.
Cyber Security
  One of the significant changes that has occurred within the realm of cyber security is technology advantages. The rate of cybercrimes have grown exponentially and is consistent with the growth of technology. As technology expands and develops, so do the cybercrimes that are committed (Rid & Buchanan, 2016).Therefore, developing technology affects cyber security. One way developing technology has changed cyber security is through corporate security breaches. The majority of these corporate security breaches occur when hackers exploit employees through social engineering and scams. With advancements in technology, hackers are becoming more skilled at finding holes and cracks in corporate security systems and can gain access to protected files and data, posing a significant cybersecurity threat (Rid & Buchanan, 2016).
Most Significant Threat
  While it is difficult to accurately predict the most significant threat, we will face in the future based on cyber threat, one aspect that needs to be discussed is the pandemic. With the pandemic, more individuals have been working from home. With individuals working from home, there is an increased risk of security breaches.
Biblical Worldview
  Cyber-attacks can be viewed as stealing of property. From a biblical worldview stealing is a sin. One Bible verse states, “Anyone who has been stealing must steal no longer, but must work, doing something useful with their own hands, that they may have something to share with those in need” (King James Bible, 1796/2020, Ephesians 4:28).

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Homework Discussion only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Homework Discussion are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Homework Discussion is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Homework Discussion, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.