Saturday, February 8, 2020
The importance of Ethics to Sustainable Growth in Engineering Essay
The importance of Ethics to Sustainable Growth in Engineering Enterprise - Essay Example In the instances where security measures are inadequate, the consequences are usually catastrophic. Although the threats are becoming more sophisticated, some organizations have managed to mitigate the impact by regularly reviewing their security capabilities and capacities so as to identify areas of vulnerability. In coming up with the cyber security measures to protect the information and the IT resources, organizations and individuals are required to understand the risks they face so that the right interventions can be put in place. This has therefore necessitated research on various malware programs like Trojan horse, spyware and worms from a scientific perspective. Empirical studies have also been carried out to help identify the relevant strategies that can be used to alleviate and eventually eradicate the threats originating from the cyber space. Based on the previous research, it had been anticipated that the future attacks and threats would be characterized by a combination malware with strong cartography. In the last couple of years, there has been the emergence of a new form of malware in the cyber spaces and it has put organizations at increased risk of suffering attacks. Ransomware has emerged to be a source of threat both to individuals and organizations. It has drawn the attenti on of almost all the IT system security specialists, practitioners and researchers. Empirical and evidence based studies continue to be carried to help understand the new emergent threats to allow organizations be prepared to mitigate its impacts. Teer, Kruck & Kruck (2007) notes that ransomware perpetrators are able to victimize the internet users and organizations by hijacking the files stored, encrypting them before demanding payment in exchange for the decryption key. The threat functions by exploring the system vulnerabilities and seizing control over the victimââ¬â¢s file and computer systems until the demanded payment is made. In the last two years alone, several
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.