Advantages and Disadvantages of Cybersecurity

Home Advantages and Disadvantages of Cybersecurity

Advantages and Disadvantages of Cybersecurity

Cybersecurity

Cybersecurity refers to the set of rules and regulation which are used for protecting the network, data and program from malicious attack. The core functionality of the cybersecurity includes protection system and data from various cyber threats. Cybersecurity is the practice of protecting system, program and network from various types of network attacks. There are various forms of cyber threats such as malware, application, phishing and exploit kits. These types of cyber security attacks are usually aimed at accessing, destroying and altering the sensitive data of the user (Trappe and Straub, 2018). Therefore, there is a big need for implementing effective cybersecurity technique in the network. An effective cybersecurity approach has multiple layers of protection across the network, programs and computers or data that one intends to keep safe as in the current scenario, everyone is benefited from the advanced cyber defense programs. There are various types of cyber security attacks which are discussed below:

  1. Ransomware

It is a type of malicious software which is designed to extort money by blocking the user from accessing files in the computer system until user paid for the ransom and paying the ransom does not guarantee that the files will be recovered, or the system is restored.

  1. Malware

It is a type of software which is designed for gaining unauthorized access in order to damage the system.

  1. Social Engineering

It is the type of attack which relies heavily on human interaction and it often involves manipulating the user into breaking normal security procedures and provide best practices so that user can access system, physical location and network.

  1. Phishing

It is a practice of sending fraudulent emails which resemble emails from reputable sources. The main aim of performing this attack is to steal the sensitive data of the user such as credit card number, PIN, Password etc (PRIPAS, 2014).

The main problematic element of cybersecurity is constantly evolving nature of security risks. The traditional approach for implementing cybersecurity focus on crucial system components and protects system against many significant threats which meant leaving components undefended and unprotected against smaller risks. The cybersecurity relies on cryptographic protocols which used for encrypting files and other data. This consist of various types of technologies, controls, processes which are designed for protecting systems, data and network from cyber-attack. Effective cybersecurity reduces the risk of various cyber-attacks and protects the organization and individual from unauthorized exploitation of system, technology and network. The threat which is countered by cyber-security are three-fold: Cybercrime, which includes single or group of actors for targeting systems for financial gain; Cyberwar, which often involves data gathering and is politically motivated and Cyberterrorism, which is intended to undermine electronic systems which cause fear. There are various techniques which are used by attackers for controlling computer or networks which include viruses, spyware and trojans.

 However, there are various pros and cons of cyber security which are discussed below.

Advantages of cybersecurity

  1. It provides protection against worms, viruses, spyware and other unwanted programs.
  2. It provides protection from data theft as with the implementation high-security protocol malicious user cannot break the network architecture.
  3. Protect the system from hacking.
  4. Provide data and system privacy. This can be achieved with the good implementation of security policies and protocols in the network.

Disadvantages of cybersecurity

  • Rules of the firewall are difficult to configure correctly.
  • Makes the system
  • It is costly for the average
  • Incorrect firewalls rules block the user from accessing various services of the network.

 

Reference

PRIPAS, M. (2014). Phishing Attack – Detection and Removal. International Journal Of Information Security And Cybercrime, 3(1), 59-64. doi: 10.19107/ijisc.2014.01.07

PRIPAS, M. (2014). Phishing Attack – Detection and Removal. International Journal Of Information Security And Cybercrime, 3(1), 59-64. doi: 10.19107/ijisc.2014.01.07

Latest Reviews

  • Kaitlyn
    05 Feb, 2018

    I was totally frightened about my thesis when I contacted Assignment Help 4 Me team. But after speaking to you I got a confidence that it will be dine at time. It was such a relief for me. Thank you.

  • Lucas
    21 Dec, 2017

    I am very pleased to avail these services. I got the best service and the experts answered the query in the best way.

  • Charlotte
    25 Dec, 2017

    This is definitely the last resort for any kind of writing service. I am so grateful to the experts here. They are doing a commendable job.

View All Reviews

Facebook