-
Essay / The Core Function of Cybersecurity - 1071
Operation Aurora Americans are becoming heavily dependent on modern technology, which produces greater vulnerability to cyberattacks such as security breaches. Cybersecurity, also known as information technology security, is information security applied to computers and computer networks. It is designed to protect networks, programs, computers and data from attacks. These attacks can result in damage or unauthorized access to data. IT security also includes protection against unforeseen events and natural disasters. The primary function of cybersecurity is to protect computers, networks, programs and data from unintended or unauthorized access, modification or destruction. Confidential information on computers is collected, processed, stored and the data is transmitted over networks to other computers in the military, business, finance. institutions and government. The volume and complexity of cyberattacks are increasing rapidly. This requires continued attention to protect sensitive business and personal information, as well as to safeguard national security. In March 2013, intelligence officials assessed cyberattacks and digital espionage as the greatest threat to national security. The unauthorized movement or disclosure of sensitive information to a party who is not authorized to hold or see the sensitive information is called a data breach. Between January 2005 and May 2008, according to the nonprofit consumer organization Privacy Rights Clearinghouse, a total of 227,052,199 records containing sensitive personal information were involved in security breaches in the United States. Operation Aurora was first publicly disclosed by Google on January 12. , 2010. The attack started in mid-2009 and continued until mid-paper...... at the same time, these attacks are so sophisticated that it becomes difficult even for a professional to Seasoned security, to understand if a link is good or bad. Many companies have looked at their policies and procedures and realized that education is only one part. 16.Cha, Ariana Eunjung; Ellen Nakashima (01/14/2010). "Google's cyberattack in China is part of a larger espionage campaign, experts say". Accessed February 16, 201. Gerdes, LI (2009). Detroit: Greenhaven Press. Tankard, C. (2011). Advanced Persistent Threats and How to Monitor and Deter Them, 2011(8), 16-19. Zetter, K. (2010). Google's hacking attack was ultra-sophisticated. , new details show Wired Magazine., 14.