Sample Computer Science Reflection Paper on Cyber Threats

Cyber threats are a common threat in today’s internet world. According to Statista report, as of 2017, 6% of global internets users had their account hacked online. Malwares and viruses infections are the most prevalent attacks at 16% of the experienced attacks. Organizations should, therefore, be careful with passwords and login IDs since they hold sensitive information. One way that organizations can protect their logins ID and password is to employ the Advanced Persistent Threats (APTs) methods, which are used to gain access to organizational networks by the hacker. One of the persistent APTs organizations is phishing attacks via emails. Unsuspecting users can install viruses and malwares from the organization’s computer network and can easily corrupt or leak personal and organizational data to unauthorized sources (Chen. Desmet & Huygens,2014).

Therefore, it becomes the organization’s responsibility to secure their data on the internet and implement enough firewalls from unethical access and hackers. A team of cyber specialists is required to keep watch on spams that may flow into the system to gain access or delete the vital information from the system. Therefore, it is highly recommended that organizations employ a team of smart cybersecurity guards in the form of the team to ensure the safety of the organization in today’s information technology world.  Computer security analysts are essential for an organization because they can help keep the network system updated and also install antispam software, filters as well as software to help thwart cyber-attacks. Training employees, though it is expensive, is a crucial exercise if the organization will be able to combat cybercrimes. Training Employees for the organization such as the military might be unrealistic, given that there are over 1.3M active duty military and over 800,0000 in reserve forces by (Governing, 2017).  Thus, in this case, however, the U.S. military must be to train to employ certified ethical hackers (CEH) to work alongside the computer security analysts to train and initiate a training and awareness campaign. Such a campaign should be on-going given that the cyber-attacks keep on evolving as a result of the rapidly changing environment.

The CEH is a qualification obtained by validation of knowledge where an expert can assess the organizations security systems through the exploration of weaknesses and vulnerabilities within the traget systems, using tools such as the malicious hacker would use. They would also be able to adequately test individual employees through simulated tests to identify the most vulnerable group within the military. CEH course is designed for generating ethical hackers that are employed in an organization to safeguard the cyber system using domain knowledge and tools as a malicious hacker but legitimately and legally. CEH has now become essential and vital for any software engineer, and he needs to be acquainted with all the possible hacking methods and basic safeguard technology. The CEH course enforces on the latest malware attacks, current hacking tools, and future haking tools. Different case studies are discussed in the course duration so that the ethical hackers are fully trained to cope up with any hacking scenario. CEH is also accredited by the American National Standard Institute within the U.S. Department of Defence’s data assurance workforce, among other recognition globally (Oriyano, 2016).




Chen, P., Desmet, L., & Huygens, C. (2014, September). A study on advanced persistent threats. In IFIP International Conference on Communications and Multimedia Security (pp. 63-72). Springer, Berlin, Heidelberg.

Governing (2017). Military Active-Duty Personnel, Civilians By State. Retrieved from

Oriyano, S. P. (2016). CEH certified ethical hacker study guide: version 9. Sybex.

Statista (2017). Most commonly encountered cyber threats according to Global internet users… Retrieved from