Protecting Yourself Against the Treats of Cyberspace

1022 WordsJun 19, 20185 Pages
Cyber Security It seems like everyone in today’s society has access to a computer, a cell phone, or some other type of technology that allows information to be passed from one person to another through space. With your private information out there in cyberspace, clever thieves are finding ways to access your personal informational and to steal from you without you even knowing about it until it is too late. The thieves are taking your personal data and using it to gain access to your accounts. In fact, there are many different ways thieves are threatening your safety in cyberspace. Each of these threats is serious in nature and one should act upon it immediately before more damage is done. One type of threat people have to deal with…show more content…
Why? Because hackers have the temptation to brag and to share information they learn with other hackers, so the trainee will become one of them. Once the trainee understands the hacker’s ways of infiltrating computers, the trainee will find a way to prevent it or at least slow it down. How will this be done? Research is hoping to use the latest data-mining techniques to look through online conversations to find the hackers that possess the most potential harm to the computers and figure out the strategies they use so they can block it. With regards to the nation’s security when it comes to cyber attacks, the Department of Homeland Security and the National Security Agency uses a system that monitors all activities in the federal agency network system so they can seek out possible threats to their system’s safety and privacy. This system is known as EINSTEIN. There are three phases of EINSTEIN. EINSTEIN 1 is a program that can detect intrusions on one’s computer and then reports. EINSTEIN 2 is a program that can detect intrusions on ones’ computer in almost real time. Sensors are built in that will alert the government of all activity going in and out of the network. The information collected will be able to tell if a threat such as malware, worms, network backdoors, and Trojan horses are detected. EINSTEIN 3 is the newest security system and cannot only detect cyber threats but has the

More about Protecting Yourself Against the Treats of Cyberspace

Open Document