Thursday, May 9, 2019

Social Networks Research Paper Example | Topics and Well Written Essays - 1750 words

Social Networks - Research reputation ExampleIt has by and large bridged the gap between willing buyers and sellers hence distance has proved to be no longer a challenge in transaction beca intake it has enhanced communication between parties involved. Besides, the net profit has proved to be mans greatest innovative achievement and a popular mover used in the performance of numeric functions and to enhance communication in the banking sector. Far from this, the cyberspace which is interchangeable to cyberspace has even dominated the health sector. It facilitates the distribution of power, enforcement of law and even delivers or retains very hidden information. However, since it is a public utility, the internet has caused much havoc to mankind because sometimes it has not been used for purposes for which it was intended. both(prenominal) cyberspace users sacrifice abused the internet and have thus rendered it a vulnerable social, political and economic tool. Cyber threat ha s remained a top concern in most nations because of surety concerns. Research and study have found out that cyber security has continued to cast up in intensity and sophistication with time. Its gravity has been witnessed everywhere hence this calls for great security concern in the entire world. As we can see, the ever-growing need to use internet services in our everyday life places individual users and even the administration and organizations into a problem of combating risk factors associated with fraud and sabotage of important information and sometimes the security threat to a individual (Yar, 2006). Cyber space hackers have more than often hacked and tampered with confidential government and corporate information, which they use to cause security threats targeting not only government officials but also the common man. Cases of terrorism have continued to increase with time. This is alarming since massive loss of people and properties have been witnessed. The terrorists have routinely targeted business hubs and top government institutions. Victims of cyber attacks have bailiwicked that they have also lost massive investments in the process of cyber attacks. This is a librate of concern since no measures placed have proved reliable to curb this scam. According to a report by the National Academy of Sciences (2010), it has been noted that not even the renowned tech-savvy individuals and organizations have managed to stay repellent to cyber attacks. Victims of cyber attacks have included important service providers like telecommunication companies, Google, travelling industries, defense and even the banking sectors. This shows that nonentity is immune to threats caused by cyber attacks. However, some of the experts causing cyber threats have tried to justify their actions as not universe in any way related to threat in the cyber. Some of the terms used to bear on to these techs savvy that have sometimes used the internet for purposes other than what is intended have tried to name a distinction between themselves and real criminals. For instance, terms which have always confused computer users are hackers and crackers. As far as computer security is concerned, programmers have tried to bring out their careen that someone who tries to break into other computers is better termed as cracker because they use it for ill intentions. According to such experts, computer crackers are like criminals because they use the internet to cause security concerns to other internet users hence are sometimes called black hats. They cause security

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.