Running head: CYBERSECURITY. 1
Cybersecurity.
Student Name.
Institution Affiliation.
Date.
, CYBERSECURITY. 2
Cybersecurity.
Introduction.
We have heard of cybersecurity; some have experienced it. cybersecurity refers to the
practices that are used to protect the system, program networks, and networking devices from
digital attacks (Simola, 2019). Digital attacks are those attacks that are performed over using the
current technologies available. These technologies may be either internal or external or both. In
the case of internal, the attacks are performed by the people working on the organization such as
the employees, when the attack is said to be from outside, it comes from a person not working
from the organization. In the case of both, malicious activity may be performed by an outside
collaborating with an insider. All these cases aim at stealing or destroying the information
available in the system. Several practices have been put in place that organizations should use to
ensure that they keep their systems safe from attacks. In this paper, we are going to major on
internal threats.
Internal Threat to Information Security Overview.
Information security, sometimes referred to as InfoSec refers to the practices that are used
to ensure that all the components of an information system are kept safe from unauthorized
access. These practices have been improving since they were first used. Information security is
vital in ensuring that the system is safe from intruders who may have malicious intentions on the
system and its components (Vakilinia, 2017, July). These practices started with simple
passwords and pins to complex passwords and not biometrics. Technological advancement and
the hard work of cipher analysts led to these quick improvements when security is concerned.
When a new method is developed, cipher analysts work to understand the new security
measure and then work to crack it, this way the developers will be forced to think of another
Cybersecurity.
Student Name.
Institution Affiliation.
Date.
, CYBERSECURITY. 2
Cybersecurity.
Introduction.
We have heard of cybersecurity; some have experienced it. cybersecurity refers to the
practices that are used to protect the system, program networks, and networking devices from
digital attacks (Simola, 2019). Digital attacks are those attacks that are performed over using the
current technologies available. These technologies may be either internal or external or both. In
the case of internal, the attacks are performed by the people working on the organization such as
the employees, when the attack is said to be from outside, it comes from a person not working
from the organization. In the case of both, malicious activity may be performed by an outside
collaborating with an insider. All these cases aim at stealing or destroying the information
available in the system. Several practices have been put in place that organizations should use to
ensure that they keep their systems safe from attacks. In this paper, we are going to major on
internal threats.
Internal Threat to Information Security Overview.
Information security, sometimes referred to as InfoSec refers to the practices that are used
to ensure that all the components of an information system are kept safe from unauthorized
access. These practices have been improving since they were first used. Information security is
vital in ensuring that the system is safe from intruders who may have malicious intentions on the
system and its components (Vakilinia, 2017, July). These practices started with simple
passwords and pins to complex passwords and not biometrics. Technological advancement and
the hard work of cipher analysts led to these quick improvements when security is concerned.
When a new method is developed, cipher analysts work to understand the new security
measure and then work to crack it, this way the developers will be forced to think of another