Cyber Security and Cyber Weapons

3827 Words Apr 2nd, 2013 16 Pages
“Securing a computer system has traditionally been a battle of wits: the penetrator tries to find the holes, and the designer tries to close them.” ~Gosser
Warfare has always been a game of cat and mouse. As technology increases war has to adapt with it. Wars have evolved from a contest of strength to a show of potential. Previously wars were fought with large armies and whomever could most effectively utilize the most troops with better training won; now however, a single person with a nuclear bomb can destroy a city within seconds. In the 1980s, a new technology appeared: the internet. At first the internet was just a way for people to communicate by sending text files to each other. Soon however the internet became a public
…show more content…
There are different types of of cyber security: Application security is specific to different applications
(programs) and deals with the measures that the program takes while it is running to prevent errors and handle exceptions when there is a flaw (an example of this can be the Windows Blue Screen of
Death). Information security is when a company/nation tries to defend information or trade/military secrets from unauthorized access (an example of this is when Gmail is encrypting its passwords).
Disaster recovery is the process in which a program tries to recover data after it is corrupted due to a malfunction in the program (an example of this is the system recovery or restore factory settings on any computer). Business continuity planning is "identifies an organization 's exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization, while maintaining competitive advantage and value system integrity”3 (An example of this is corporate espionage... and protecting from this). End­user education is teaching the users (users

3

Elliot, D.; Swartz, E.; Herbane, B. (1999) Just waiting for the next big bang: business continuity planning in the UK finance sector. Journal of Applied Management Studies, Vol. 8, No, pp. 43–60. Here: p. 48.

4

and administrators) how to handle different software (an example of this is computer science classes).

More about Cyber Security and Cyber Weapons

Open Document