Cybersecurity of Central Institutions

Introduction

Internet is one of the integral parts of the modern digitalized society that contributes to the fast data exchange and helps to perform the majority of existing tasks fast and effectively. The rise of this tool provided multiple opportunities for the further development and achievement of new levels of evolution (Wang, Lau, & Gerdes, 2018). At the same time, the growing importance of this tool gave rise to the problem of cybersecurity as opportunistic people acquired an opportunity to interfere with the functioning of various organizations and corrupt them (Simon & de Goede, 2015). For this reason, the issue of cybersecurity acquires the top priority and should be given significant attention to preserve the existing order and guarantee the effective functioning of central institutions.

Background

Today, hack security is still not considered by some individuals as one of the major concerns. However, statistics evidence that there is a tendency towards the growth in the number of maleficent actions performed via the Internet and with the help of different software (Diffee & Datta, 2018). Hackers and cybercrime become one of the main threats to the functioning of society and its safety (Hatleback, 2018). For instance, the scandal associated with the recent presidential election in the USA and the use of various digital tools to impact results prove the necessity to monitor this aspect and introduce appropriate measures to prevent the future deterioration of the situation (Cowley & Greitzer, 2015).

Objectives

Regarding the information provided above and the growing importance of the Internet along with the poor understanding of cybercrime and its essential character, the following project has the following goals:

  1. Analyze the concept of cybersecurity, its importance, and role in the functioning of contemporary society.
  2. Show the negative impact of hacks and cybercrime on various organizations and processes and analyze possible results.
  3. Investigate the problem of security and measures that can be performed to avoid the further deterioration of the situation and attract attention to the discussed problem.

The introduction of these objectives is explained by the fundamental need to research the topic of cybersecurity as one of the essentials from various perspectives and outline the most problematic aspects associated with it. These goals will help to conduct in-depth research on the problem and describe the most important factors that should be considered.

Plan

First of all, it is critical to review the literature regarding the growing importance of the Internet and its role in the existing society. It will help to create the theoretical framework for the discussed problem.

Second, the existing cyber threats should be evaluated with the primary aim to emphasize the problems organizations might face and the negative consequences that might appear.

Finally, possible approaches to cybersecurity should be analyzed to create a final report that includes answers to all the goals outlined above.

Data Integrity

Cybersecurity (CS) is one of the fundamental elements of data integrity as it guarantees information safety, confidentiality, and availability to users. For this reason, the report will touch upon this aspect and discussed in regarding all three presented goals.

Annotated Bibliography

Cowley, J. A., & Greitzer, F. L. (2015). Organizational impacts to cybersecurity expertise development and maintenance. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59(1), 1187–1191. doi:10.1177/1541931215591185

The article outlines the correlation between the work of organizations and the approach to cybersecurity among specialists working in the sphere. It contributes to a better understanding of current perspectives on the problem.

Diffee, E., & Datta, P. (2018). Cybersecurity: The three-headed Janus. Journal of Information Technology Teaching Cases, 8(2), 161–171. doi:10.1057/s41266-018-0037-7

The authors explain the nature of cybersecurity and discuss its fundamental elements that should be considered. Information can be used to show how the discussed issue should be addressed.

Hatleback, E. N. (2018). The protoscience of cybersecurity. The Journal of Defense Modeling and Simulation, 15(1), 5–12. doi:10.1177/1548512917737635

The paper discusses the critical need for the new approach to cybersecurity regarding its increased importance. The information can be used in the project to evidence the need for the in-depth investigation.

Simon, S., & de Goede, M. (2015). Cybersecurity, bureaucratic vitalism and European emergency. Theory, Culture & Society, 32(2), 79–106. doi:10.1177/0263276414560415

The document outlines the European modes of governing regarding the existing threat to the Internet and the possibility of interference.

Wang, H., Lau, N., & Gerdes, R. M. (2018). Examining cybersecurity of cyberphysical systems for critical Infrastructures through work domain analysis. Human Factors, 60(5), 699–718. doi:10.1177/0018720818769250

The authors discuss how essential infrastructures can be protected regarding the high risk of hacking. The paper can be used in the project to examine the existing threats and ways to resist them.

Cite this paper

Select style

Reference

StudyCorgi. (2021, August 25). Cybersecurity of Central Institutions. https://studycorgi.com/cybersecurity-of-central-institutions/

Work Cited

"Cybersecurity of Central Institutions." StudyCorgi, 25 Aug. 2021, studycorgi.com/cybersecurity-of-central-institutions/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2021) 'Cybersecurity of Central Institutions'. 25 August.

1. StudyCorgi. "Cybersecurity of Central Institutions." August 25, 2021. https://studycorgi.com/cybersecurity-of-central-institutions/.


Bibliography


StudyCorgi. "Cybersecurity of Central Institutions." August 25, 2021. https://studycorgi.com/cybersecurity-of-central-institutions/.

References

StudyCorgi. 2021. "Cybersecurity of Central Institutions." August 25, 2021. https://studycorgi.com/cybersecurity-of-central-institutions/.

This paper, “Cybersecurity of Central Institutions”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.