Sample Computer Science Paper on Cyber security

Cyber security Essay

Today, cybercrime is an issue that lingers on everybody’s mind. Cyber crime takes place in electronic environment thus making cyber security to be a necessity. The entire universe is united in trying to eradicate emergence of new cybercriminal activities in this cyber age while some factions secretly promote the advancement of cybercrime to support their agenda. Cyber-threats and the measures necessary to counter them and mitigate their impacts are security issues in the contemporary society. Cyber security should be addressed in every company as a measure of protecting privacy, which is vital to the success of many corporations around the globe. This essay analyzes cyber security and its importance in the fight against cyber crime in the contemporary society.

An increasing number of high-profile data breaches have led to many companies losing big business contracts. As a matter of fact, a company loses its competitive advantage as well as reputation owing to cyber-attacks on the company’s systems. Investing in a reliable cyber security system determines how well an institution may be able to protect its privacy (Brenner, 2010). More importantly, the ability to guard confidential information determines a company’s reputation as well as its competitive edge over other firms.

Akhgar et al assert that data breaches can cost a company anywhere between $ 60,000 to $ 420,000 for SMEs and $ 1.2-$3.1 million for established corporations (2014). These figures easily justify the significance of fostering a culture, which aims at protecting vital information. As a result, organizations which can strategically invest in cyber security are more likely to avert the huge losses related to a breach in the company’s security system.

Being able to navigate the ever-changing threat levels of the cyber landscape presents serious challenges for today’s modern, technologically-savvy organizations established that a compromise of the company’s security system can be as a result of human error or environmental factors in the cyber landscape (Wall, 2007). Cyber security can offer a holistic picture of emerging potential threats; thereby, leading to awareness, which can result in thwarting the attacks before they materialize.  Cyber-security is a form of risk management, where risk is a function of three variables; vulnerabilities, threats, and consequences. The digitization of nearly every aspect of business has created a complex security landscape, leaving organizations electronically exposed and vulnerable to cyber risks.

Cyber security is a viable solution to criminal activities that take place on the internet. It not only helps protect privacy, but it also helps predict future attacks; thus, prevent loss of company resources. It is advisable that various corporations should invest in cyber security. Large corporations are faced with cyber security challenges which lead to huge financial losses. The use of electronic communication and computer resources in cyber space allows the cyber criminals to successfully carry out their operations. The rapid progress in the development of information technology and its grown impact on social phenomena and processes has led to cyber crimes. Cyber security is crucial to maintaining operations, compliance and safety of data that is essential to the effective running of an organization.

Cyber attacks on organizations have become more sophisticated in recent years due to the continued evolution that is happening in the information technology sector. This has made it necessary for organizations to come up with sophisticated strategies of countering and mitigating the impacts of cyber attacks. Organizations can use various preventive measures to mitigate the impact of cyber crimes and prevent financial losses. These preventive measures include the use of firewalls to filter information within the organization by controlling the information that is entering and leaving the firm. Firewalls prevent unauthorized access by inspecting and filtering packet traffic between networks.

There is a need for organizations to evaluate their vulnerabilities and weaknesses and implement an effective security strategy to counter them. Network security typically serves as the first line of defense against a cyber threat and minimizes the impact of each threat incase it materializes. Organizations must take proactive measures to cyber security that involves ongoing risk assessment, well-defined security policies, and an aggressive overall security strategy. A proactive approach is better than a reactive approach because it prevents threats from materializing and mitigates their impacts incase cyber criminals are able to beat the security system of an organization.

Firms should also have centralized management systems to ensure network access points continuously monitored to detect threats. Potential threats can be detected and notifications sent to contacts that are responsible for the cyber security of a firm through a centralized system thus mitigating the effects of threats. This keeps stakeholders updated on the latest threats and vulnerabilities that are posed to their system. A centralized security management system is essential because it helps stakeholders to collect crucial information that is essential for the development of a more reliable cyber security system and detect threats and take proactive measures. A centralized management system also enables security experts to collect and store system components, indexing them for quick and easy retrieval. Centralized management can also aid in supporting a strong password management, as well as enforce role-based access control.

Firms should also have regular maintenance intervals to keep systems up-to-date. First, updates to the firewalls and other protective devices can help monitor or protect the control system network for known attack signatures and unusual network activity. Companies should also have a validated patch management program to prevent disruptions that are likely to occur from potential threats. With validated patch management, the patch is run in a virtual environment on-site to identify incompatibilities that may exist before the patch is applied.

Firms also face major challenges in the fight against cyber criminals in the provision of good services to users and their customers. Complexity is a challenge that many organization face in developing a reliable cyber security system, the continued evolution of cyberspace, as a fully electronic world has created interconnected networks. Complexity which is brought about by a large amount of date handled by organization makes the data more vulnerable to threats.  The interconnected networks in the contemporary society are characterized by an enormous amount of data (Spalević, 2014). A large amount of data makes it hard for an effective cyber security system which is resistant to both internal and external threats. Data elements are combined, connected, compared and linked to other information as organizations try to capitalize on its value and to offer improved services. This complexity is the major challenge that is facing many firms in their quest to provide better services to their users and prevent their data from being destroyed.


The complexities of cyberspace and the mounting sophistication of threats make it necessary for t firms do more about privacy protection on cyber security efforts. Cyber Security is crucial in the protection of information and preserving privacy in cyberspace. Cyber resilience is a prerequisite for continued existence and potential competitive advantage of business organizations (Ferdinand, 2015). Cyber security requires collaboration so as to ensure threats are minimized and their impacts mitigated.



Akhgar, B., Staniforth, A., Bosco, F. M., Elliot, S., Rearick, B., Kumaraguruparan, P., & Rogers, M. (2014). Cybercrime and cyber terrorism investigator’s handbook

Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif: Praeger.

Ferdinand, J. (2015). Building organizational cyber resilience: A strategic knowledge-based view of cyber security management. Journal of Business Continuity & Emergency Planning, 9(2), 185-195.

Spalević, Ž. (2014). Cyber Security as a Global Challenge Today. Singidunum Journal of Applied Sciences, 687-692.

Wall, D. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity.