Get help now
  • Pages 2
  • Words 348
  • Views 442
  • Terra
    Verified writer
    • rating star
    • rating star
    • rating star
    • rating star
    • rating star
    • 4.8/5
    Delivery result 3 hours
    Customers reviews 387
    Hire Writer
    +123 relevant experts are online

    Cyber Security And The Internet Security Essay

    Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get help now

    124 experts online

    Businesses and people are using Internet for entertainment, e-business and e-commerce, social networking, and communication to the people and business, but there have always been threats to the Internet Security. Internet security is major concern in field of technology, because there are various personal, business and government data on the Internet. Today every businesses and organizations have their own security systems to reach their goals of information security. Internet security systems are created to reduce cyber attack risks, reliability, maintain confidentiality, and compliance with privacy laws and national security laws. However security standard that has been made, and laws brought by government are not more enough to protect Internet Security, so more advanced security and more strict law by government should be brought in action to protect Internet Security.

    There are different kinds of security standards when integrating security approach in new systems. Some government agencies and organizations adopt well-established standards, while some companies make their own private security systems. Storing data Offsite has been beneficial for business to store data on cloud due to storage insufficiency. Devanney, the author of “Offsite Information Storage: Cloud Computing And Cyber Security Issue” explains that The Department of Justice divides cybercrime into three categories: the computer as target, weapon, and as an accessory (p3). Lost Internet connection can heavily affect those organizations, which use PSA system with the cloud. Devanney also claims that current PSA packages are beginning to partner with ERP in order to create more accessible software.

    US Department of homeland security has conducted a campaign “ The. .n.ReferencesBailey, T., Kaplan, J. M.

    , & Rezek, C. (2015). Repelling thecyberattackers. Mckinsey Quarterly, (3), 54-63.Department of Homeland Security. Stop.

    Think. Connect. (2010) Retrieved from, P., Quilliam, W.

    , DuVal, C. W., & Santos, N. “.(2016). Offsite Information Storage: Cloud Computing and Cyber Security Issues.

    Annual International Conference On Accounting & Finance, 75-78. doi:10.5176/2251-1997_AF16.37Szoldra, P. (2015). The 9 worst cyber attacks of 2015 Retrievedfrom http://www. The White House, Office of the Press Secretary (2015, January13). Announcement by the President on SECURING CYBERSPACE. Retrieved from

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need custom essay sample written special for your assignment?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Cyber Security And The Internet Security Essay. (2019, Feb 15). Retrieved from

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper
    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy