Introduction
1 Everyday we see innovations, new technology in the market, updates, upgrades. The world is moving forward and it is moving rapidly. Businesses around the globe are becoming more dependent on an ever-increasing selection of IT systems and technologies more and more as time goes on. Furthermore, they need to be interconnected with their suppliers, venders, customers and business partners. The dependency on technology combined with interconnection of their business and rapid increase has increased the potential of cyber security risks. Cyber attacks are not just an IT problem; they are more a business risk. Hacking has evolved from hackers to hack for fun to just look for technical vulnerabilities to being sponsored attacks that are targeting specific industries, sectors, companies, and individuals. Cyber attacks methods evolve incredibly fast, complexity, and impact with new, more complex cyber risks everyday. “Many organizations across the industry spectrum are suffering from substantive technology debt.” (PWC.com). Companies are so focused with their emerging business technologies, but they forget that their IT infrastructure is suffering. Their IT infrastructure is aging and it is getting to the point that it cannot even support basic data security functions. Yes, Technology has grown its influence on business, such as “mobile solutions, social media, alternative workplace solutions, collaborative product innovation, digitized healthcare, and telemedicine.”
The entire cyber security industry is in a period of growth. As both corporations and private consumers are becoming aware of vulnerabilities with their online presence cyber security firms, have learned how to offer in-demand solutions for a wide variety of customers. Within the field of cyber security, there are several different types. These different types of services range from protection on the Internet of Things to producing devices to protected connected cars or phones. Each of these areas are expected to grow by the year 2020 with some being more in demand than others. In the article, “Cybersecurity Market Reacher $75 Billion in 2015, Expected to Reach $170 Billion by 2020,” Steve Morgan notes that, “the hot areas for growth are security
With the dramatic development in the technology of computers and communications, the entire world has certainly benefited a great deal, but the purchase price of computers might also be very expensive. Computer crimes are now becoming very serious problems that are costing as much as billions of dollars. Also, computer crimes are threatening the continuing future of communication, confidentiality, and even the integrity of businesses and organizations.
There are often times when a document covering as many aspects as were covered by the 9/11 Commission in which it becomes difficult to say definitively whether the results were effective or ineffective. This is true when speaking about whether the government has met the recommendations that were made by the 9/11 Commission. The federal government has been effective in meeting certain recommendations of the 9/11 Commission, however they have also failed appallingly in certain areas as well.
In the previous five years, cybersecurity has turned into the most looked for after calling around the world. More than 90 percent of respondents to an overview directed by the Ponemon Institute (2011) detailed being a casualty to cyberattacks amid the most recent year, costing all things considered more than $2 million for each association. This number keeps on ascending as the two programmers and security devices progress. As indicated by PwC, roughly 33% of all U.S. organizations are as of now utilizing digital protection (Lindros and Tittel, 2016).
Cybersecurity is becoming one of the fastest growing industries ever, due in large part because of the internet. “We expect worldwide spending on cybersecurity products and services to eclipse $1 trillion for the five-year period from 2017 to 2021” (Morgan, 2015). So just why is the internet the reason behind the sudden growth of cybersecurity products and services? The internet is the structure of interconnected computing appliances and digital machines that are provided with unique identifiers, such as a Uniform Resource Identifier (URI), Uniform Resource Locator (URL), Universal Unique Identifier (UUID), Bank Identifier Code (BIC), Service Set Identifier (SSID), National Provider Identifier (NPI), etc. These are just a few devices and unique identifiers that are utilized daily by the average individual worldwide that revolve around the ability to transfer data over the internet/network. The cybersecurity industry exists for the simple purpose of safeguarding the biggest companies down to a single individual that are wanting to protect vital information or data from cyber-attacks. This industry has benefitted the consumer wanting security from hackers and furthermore the workforce who are considering careers in this background. Cyber security has delivered personnel with employment in the security analytics, threat intelligence, mobile security, and even cloud security to name a few.
Traditionally, IT (Information Technology) security focused on securing the IT assets within the organization’s IT framework. However, with the advent of smart mobile devices, cloud computing, and remote connectivity, the IT landscape has changed dramatically in the last few decades. With these changes, the frequency of attacks by cyber criminals has increased as well. We constantly hear news reports of large-scale cyber attacks targeting financial, government and healthcare organizations. Moreover, the type of attacks has evolved to become more sophisticated and untraceable, making it difficult for security analysts to keep up with the every changing technological demands of creating and maintaining an effective security. This has now led many security experts to believe that having an effective defense mechanism in place is a much viable option than to be reactive to threats. This also makes sense from a business perspective. Companies want their IT investments to further their business goals and not to be constrained too much by focusing heavily on IT security, which could potentially lead to an increase in operational costs to tackle security issues.
When someone talks about information technology is important to talk about cyber-attack, because cybercrimes have increased a lot in recent years. Perceptions about hacking and computer crime are changing because of the increased dependency on the internet into our daily life. In order to continue to provide a safe and secure computing environment, IT professionals need to comprehend the examination of high profile cyber-attacks that includes Target’s data breach (2013), Google China hit by cyber-attack (2009), sabotage Iran’s nuclear program (2007 to 2010). This examination of high profile cyber-attack assists to (1) serve as a preventative measure, (2) encourage safety policies, and (3)
Issues of cyber security have come to the forefront of global knowledge and focus. Like many technological issues, it has been a problem for a long time and light has recently just spread in this issue. The emergence of people becoming technologically understanding has led to an ever-expanding rate of technology development. With this, businesses have a need to rely on the internet to broaden their reach of the market while still taking measures to ensure that their information and data stay protected from unauthorized access or attacks. There seems to be no clear preventive solution to the problem as technology is always on the rise while the law and implementation of the law tend to fall behind. Many argue that economically safe options will protect businesses better in the long run, while others argue that making more progressive laws will improve the solution. Though cyber security is primarily the focus of technological businesses, businesses across all fields have differing amounts of interest in the subject as well. As is to be expected, the topic affects each field differently, whether it be focusing on the different information held, or simply a different audience targeting it. The economic strategy brings structure while the law is catching up by relying on old modified statutes.
Almost all kind of large and small organizations might face increasing number of attacks into their network or intellectual property. This may lead to data disclosure, data destruction, and damage of organization’s reputation. There are numerous threats in the cyber space which might be capable of stealing, destroying or making use of out sensitive data for financial and non-financial gains. As the amount of computer, mobile and internet users increases, so does the number of exploiters.
The revolutionary rise of technology has lead to a new “digital era”, resulting in more and more organizations becoming heavily dependent on technology. Each department of an organization, whether it be accounting, production or human resources, is creating, acquiring, handling, stockpiling and sharing more data every day. Worryingly, a number of potential risks accompany our dependence on technology with cybersecurity representing the biggest challenge.
Cybersecurity as we have all come to understand, can be either a critical barrier or key enabler to an organization’s ability to be productive. Current top of mind concerns for protecting the modern enterprise coalesce around 5 key areas: infrastructure, SaaS, devices, identity and response.
Today, cyber threats are becoming progressively more sophisticated, and attackers are harder to detect. What was once a seemingly straight forward safeguard using antivirus, antispam, and firewalls, has now grown into insidious and continuous system attacks. Within any enterprise, data is the forefront of its commercial capital, and any loss, reputation, or breach can result in catastrophic budgetary overhead. Organizations oftentimes ponder over lucrative security investments, sadly these aren’t the result of proactive but reactive measures. Attackers are fiercely penetrating enterprise networks, infrastructures, computers, and physical systems.
The human and technological aspects of cyber threats changed dramatically in the past year. Witnessing new techniques blended with the old, resulting in highly evasive attacks. Recently we have seen big business, corporations,
Today’s world is of inter-connectivity. People and organizations are inter-connected to each other via internet. Organizations are moving their businesses to internet by exploiting the internet resources made available to them through internet. The internet has revolutionized the means of business communication. Therefore, organizations are extensively moving their data to internet to make it available to others for business purposes. Internet provides the required resources like memory, storage for executing business operations. Along with lots of benefits and business opportunities, internet introduces you with the complex and system expanded new vulnerabilities that puts security risks to organizations. These vulnerabilities are both technical and managerial. The increasing rate of cyber-crime in the world of internet has provoked the think tanks to consider it as a crucial and important aspect of secure software development (Dhillon, G., & Backhouse, J. 2001).
Cyber threats have become more and more sophisticated, and have demonstrated that static security concepts are no longer adequate with today’s advanced and well-funded attackers. The increasing risk of espionage within the cyber domain has revealed that data is not protected. It has even become important for organizations to re-evaluate their methods in protecting their systems, and should urge the need for an additional ‘pre-emption’ phase for better prevention techniques, detection, and response (Fischer, 2014). There is not as much concern about the type of the security concept, but more about the policy in place that organizations choose to adopt in an effort to battle the threats. There is a gradual