Thursday, May 28, 2020

Cyber Warriors and Cyber Security Technology Assignment - 1100 Words

How a Cyber Warrior Can Use a Social Networking Site to Obtain Information (Essay Sample) Content: Author:The institution of Affiliation:Professor:Date:Cyber Warriors and Cyber SecurityAs technological advancements occur every single day, the involvement of personalities into the cyberspace is becoming more and more inherent. This owes to the fact that virtually everything from the social, political to the economic sphere operate efficiently because of advancement technological systems. For this very particular reason, the realization of creating awareness to as many people as possible in matters technology is ideal since it will hugely contribute to the worlds progress.According to PW Singer(1), even other professionals operating out of the confines of cyberspace should strive to keep pulses with the principles and foundational concepts so they do not get cast off the cyber divide by falling prey to cyber criminals in existence. This is aimed at preventing potential attacks to the cyber arena. The Cyber Warriors therefore handily come into the picture.A cyber warr ior is an individual depth expertise in the sabotage or infiltration of information systems. Usually, they monitor the information systems in order to protect them from outside attacks in order to fulfill military and strategic purposes. In addition to that, As per Dowd Schuh (26), Auditing is an essentiality since information systems are vulnerable to interference and attack. Cyber Warriors are therefore needed in this area.How a Cyber Warrior Can Use a Social Networking Site to Obtain InformationFollowing Jeremy(1), b the social media is certainly a pivotal networking site for the cyber warriors as it paves way for the dissemination of plenty of information worldwide. In fact, even the corporate world has readily embraced advanced technological sites as a vital tool for the dissemination of information about the employees as well as keeping abreast with the work progress. Social-networking sites like Facebook, LinkedIn, and Instagram have are therefore the breeding grounds for cyb er warriors. Even the cyber warriors with nefarious motives can be manipulated the systems for their goals.Additionally, according to Dowd Schuh (30) vulnerabilities of software applications including design vulnerabilities, implementation vulnerabilities, and operational vulnerabilities are targeted by the cyber warriors so they can easily obtain information. A cyber warrior can, therefore, take advantage of the vulnerabilities in order to successfully intrude the Information systems.As per Saadawi, Jordan Boudreau (53) the cyber warriors can have access to the information systems through the firewalls after hacking so they can have their way and manipulate or obtain information ultimately. In the internet circles and particularly the social media platforms lot of information is uploaded by the users, some of this information can be very helpful to a cyber-warrior since he or she can just take the plunge into the systems in order to access a lot of information by just the click of a button. The users should be forewarned not to furnish the platforms with a lot of sensitive information regarding their residence or wealth since the sensitive information may attract cyber warriors with criminal motives and end up as victims.Following Richard (1) cyber insecurity is a huge threat to National security and therefore more people should be sensitive in what happens in the cyber realm so that they take precautions on the insecurity to evade the disastrous aftermath underneath. In addition to that, according to Saadawi, Jordan Boudreau (88), the relevant authority should also blend in with the technicalities as well as military power in order to effectively handle the war on cybercrime.The Criteria on How a Cyber Warrior Navigates and Maneuvers the InternetA cyber warrior should make good use of their expertise while going about the information-searching endeavor to successfully obtain the information as required without fail. To begin with, the basis on which the cyb er warriors operate relies heavily upon the vulnerability concept of the operating systems.The vulnerabilities of software applications including implementation vulnerabilities, design vulnerabilities, and operational vulnerabilities give the cyber warriors the loopholes of intrusion so they have their way through. (Dowd Schuh 26).These is therefore the main front on which the intrusion can likely take place as conducted by the cyber warriors.Secondly, taking advantage of the vulnerabilities enables the cyber warriors to have access to the firewalls of the systems jetting right into hidden information. According to Dowd Schuh (32), since vulnerabilities cannot be traced in the source code but depends on how it interacts with the environment, the cyber warriors use this conceptual basis to track down the information following the operation correlation with its nearby environment.This may be referred to as hacking since it is not permissible and the owner of the sites or people beho lding the intruded information are usually clueless that someone may access the information. In addition to that, the cyber warriors may also introduce malware or spyware in order to alter the normal functioning of systems so that they can manipulate the information or prevent the dissemination of the information further.This is usually done with the aim of having access to the information. Also, the cyber warriors can also attain the information by tapping into the social media space. As per Jeremy (1) the social media platforms have tremendously grown over the years to become the main forms of communications in both the social and corporate world.Since a lot of information is placed on the social media platforms, the cyber warriors can also name use of these networking sites by communicating with the individuals so they derive information. For instance, a cyber-warrior can befriend a suspect in one of the social media platforms order to glean important information touching on his or her person.Answers to questions such as age, race, location and religious affiliations c...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.