Good Example Of Essay On Publisher: Forbes Magazine
Type of paper: Essay
Topic: Security, Internet, Network, Computers, Information Security, Connection, Confidentiality, Processing
Pages: 1
Words: 275
Published: 2020/11/17
Introduction to Security: Chapter 6
Summary:
Nowadays, everything can be connected to the Internet, and this phenomena is identified as the Internet of Things (IoT). Because of this, everything can be hacked, which means that everything that people do can be easily traced, including the login details that are supposed to be private. This makes the IoT security a grave issue, especially since many of these security devices are being built on “open source libraries and components, which themselves have vulnerabilities” (Poremba, 2015, p.1). Secondly, security threats are found within the device’s state of function, which can receive threats from attackers, in addition to “how and where the device is used” (Poremba, 2015, p.1). Thirdly, security threats are also found in the “unknown”, such as a network that companies install, which the customers and users do not know about. This mystery network can put the network process at risk, which may hack the information gathered from the users. Thus, it is apparent that users should comprehend well the processing of security risks, to keep a more stable and secure Internet network.
Concept/Terminology:
This article proves that there is a need for computer security, either in terms of private or public use, for organizations and individual users alike. It is also important that the computer security system is stable and secure, to keep it safe from hackers and prevent some vulnerabilities that may become the reason for hacking. The Internet of Things cannot be prevented, for it has become the trend nowadays, and everything is being connected to the Internet. However, the benefits of the Internet may tend to be transformed to detriments if users do not keep the devices—together with its functioning—safe from hackers. With this comes the conclusion that, users should understand well the processing of computer security.
Reference:
Poremba, S. (2015, January 19). The Internet of Things has a growing number of cyber security problems. Retrieved February 17, 2015, from http://www.forbes.com/sites/sungardas/2015/01/29/the-internet-of-things-has-a-growing-number-of-cyber-security-problems/.
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA