Cyber Security

  • Uncategorized


Theprotection of computer software, hardware, and all the contentstherein is termed as . For ages now, cyber securityalso known as Information Technology Security has been on theforefront of the fight against advanced crime level such as virtualterrorism. The role that cyber security plays in the day-to-day livesof modern times is far too impressive to be left vulnerable toterrorist attacks. For example, elite security task forcessafeguarding some of the highly influential personalities in theworld operate on the margins of cyber security, thus the need toexercise an advanced standard of safety measures. The relevance ofcyber security applies to all schools of life ranging from businessto religion down the list of social sciences. Cyber security is underthe obligation to protect society from all types of threat that mayprove to be rather risky than eye opening. What is even worse is thatinformation technology security is divided into more than twentybroad categories. These groups are in turn subdivided into furthersub-categories making the protection harder than it seems on paper. Agood example of a major area in cyber safety is data security. Thisis definitely the backbone of cyber security. The acquisition andstorage of data on an online platform not only requires masteringexemplary competent skills, but also total devotion to the operationof that particular cyber security firm. In the following essay, datasecurity as one of the major categories of virtual safety will bediscussed further and ideally expounded to the satisfaction of thereader. Additionally, the merits and demerits of data security willbe included too in this essay. To summarize it all, the relevance ofthis study to the real world will also be discussed.

Historyof Data Security

Datasecurity is the digital protection of data and any other content in acomputer from probable risks such as bias, theft, and infiltration.In the modern world, it happens that several organizations desire tosafeguard the reliability and authenticity of their respective datathus, designing the highest standards of algorithms. The history ofdata security is traced back in the 70s. This was a time when aspectsof telecommunication were still hitting international platforms.During the 70s, an ideology termed a phreaking was used bytelecommunication infiltrators who desired to bypass the privilege ofthe right to privacy, especially for influential individuals in theworld (Mitra 22).

Whenthis finally happened, it acted as a revelation to InformationTechnology Experts hence resulting in the need to come up with idealmeasures to counter the threats that the criminals were capable ofimpacting to the free world. Moreover, a decade later saw theemergence of computer bludgeons that led to the spread of computermalware. Malware is by far any unwanted content that has in one wayor the other found its way into the data on a computer without theknowledge of the user. Oblivious to the danger that awaits them everytime they use a computer, users were never aware of the risk theytook until the year 2000. This century brought the realist of allmalicious and sneaky information technology matters. This growth inthe level of crime had so far caused concerned stakeholders to spendsleepless nights attempting to come up with an ideal strategy on howbest to counter the risks that were bound to occur as a result ofcyber terrorism (Mitra 49). This marked the hallmark of cybersecurity in the entire world.

Aspart of the counter practices being taken to ensure that the spreadof information technology terrorism is curbed once and for all, theU.S. was the first to establish anti-cybercrime programs. At thebeginning of the idea, the United States faced a lot of oppositioncombined with barriers since the cyber criminals had the upper handfollowing the fact that they were first to attack, before allInformation Technology Security Firms attempting to design thecountermeasures (Qasimi 67).

Whenthe U.S. finally made a breakthrough in the year 2004, all the othernations in the entire world made up their minds to ape the success ofthis pioneer country. Looking back at the algorithms of data securitythat were initially developed during the 70s, it becomes as clear ascrystal that back then the software and hardware engineers were toonegligent to think of cybercrime activities. Nevertheless, more thanhalf a millennium later, the new emergence of computer gurus havefigured that for every emerging reliable aspect of advancedtechnology, there have to be potential risks, which are bestcountered through earlier detection. In relation to that, it isprudent to take note of the fact that just like it is the nature,several other schools of life, have been put in place defensemechanisms to counter any future risks, and all technological matters(Qasimi 118).


Datasecurity is the ideology or rather used to describe the manner inwhich Information Technology Professionals secure the Intel,software, and hardware of computers from all types of potential harm.Data security is described as one of the utmost sensitive occupationsin the world. Following the fact that every word, content orunintended use of the computer could lead to exposing the network toa whole variety of cybercrime risks such as hacking and identitytheft, it is only prudent for cyber safety experts to use datasecurity as the ideal strategy to keep away probable invaders. Asmentioned in the earlier bit of this study, data security is acrucial aspect of all organizations, thus the need to design highlyauthentic countermeasures meant to handle any unforeseencircumstances.

Similarly,it would be intelligent to note that the primary unit of measurementduring data securing is scrambling. It is an Information Technologyidea that requires all the original content of a computing system beshriveled up and sorted out subconsciously by designated programs.The real reason behind this move is to attempt to figure out thesimilarities that exist between the content found in the computingunit. In addition to that, scrambling ensures that for everysoftware, there is a matching hardware that is meant to secure itsrunning right from the beginning to the very end. In simple words,data safety is only one of the numerous categories of InformationTechnology Security that cyber experts strive hard to see to it thatthe whole safekeeping process works as a single unit.

Advantagesof Using the Technology

Bearingit in mind that data security is performed on an online platform, ittherefore, follows that one of its significant advantages is that ithas the power of storing a limited amount of volume of data withoutnecessarily interfering with the performance of the system. In aneffort to second this, it is relevant to consider the level of whichmatters of technology have advanced, especially from ancient times upto the current times. When this is done, what comes to the minds ofresearchers is that the storage of data on an online basis hasgradually culminated into the use of more advanced state of the artconcepts such as the use of Cloud Computing (Shaw 45).

Secondto note, data security also helps to enlighten the whole society onsome of the influential technological practices of the 21st centuryand how best to use it. Just to prove the authenticity of this merit,until 2012, the usage of smartphones and computers increased from 45%to 70%, an impressive margin within a very short time (Shaw 52). Thissimply means that the world has gotten to a place where the use ofcomputers and other technological devices of telecommunication havebeen made part of the way of life of modern human beings. The use ofcloud as an online storage unit has not hit the knowledge of allindividuals across the globe. Moreover, when a person decides to usethe Cloud storage as one of the means of data securing, and heemerges successful, he will spread the knowledge to his next partner,family member, or friends and that is how education en masscontinues.

Thirdly,data security has also proven to be low-cost oriented. During ancienttimes, data security was made possible through the use of hardwaresuch as external hard disks that are devoid of any Internetanalytical applicability. As time continued passing by, technologyimproved and sooner the process of acquiring, storing, and securingdata also moved a notch higher. In the modern world, data security ismade possible through an online basis giving computer users theimpression that the process of safeguarding personal data over theInternet is not as costly as it initially was thought. For example,consider the fact that there is no more need of an exterior harddisk. The economic stature of a particular region may not enable allthe computer users to purchase peripheral storage devices. Therefore,the storage of data in a better base has proven to be more fruitfuland lucrative as opposed to risky.

Lastlybut still considered as important as the rest, the use of datasecurity in modern world firms, businesses, and even militaryacademies ensures that the access is not only eased but the usage isalso elevated as well. Considering the fact that technology hasenabled data security to exist with or without the use of tangiblestorage devices for the securing of Intel, the impression thataccessing the data, especially at the personal level has been easedby several moves. For example, storage of data in Cloud computingrequires that the user designs two or more security verificationsteps. The idea of double or triple security checks is meant tocounter any efforts of hacking or any infiltration from unknown userswho may intentionally or accidentally access the personal data of auser (Qasimi 78).

Disadvantagesof Data Security

Asit is in the nature of many business prospects, there is always ashortcoming for every lucrative deal made, and this is not anydifferent when compared to online data security. The first majordemerit of information security is the risk of congestion. The facton file that a broad range of users all over the globe have backed upmost of their data in an online platform means that the data issusceptible to congestion. Thus, this gives an indication that one inten cases may not be able to access the data they need. This type ofcongestion has the capability of being attacked by other exteriorforces in the environment such as highly advanced malware practices.

Inaddition to that, the other demerit is that data security requiresthe complexity of great intellectuals or rather experts who canunderstand how to traverse the field of information technology withease. In relation to that, it is prudent to note the fact that allacross the globe, there are virtually more than 40% of illiteratepersonalities who may encounter unheard of difficulties whileattempting to secure their data on an online basis. This acts as oneof the major setbacks of information data security. According to thefirst rule of economics, the demand for a particular commodity orrather prospect for that issue, will alter relying on the marketcoverage. This means that, give or take a bigger market, economies ofscale will tend to vary depending upon the demand in question.Moreover, there are only a few people on the globe with the relevantIT knowledge and skills to detect these challenges. As such, theinformation of an ordinary individual in the world is at risk andvulnerable to cyber-attacks.


Datasecurity is among the major categories of Information Securitycreating the notion that its protection is crucial to the maturityand progress of the society. In modern settings, technologicaladvancements in all schools of life have made the protection of datasecurity on a digital platform a living hell. Computer experts andInformation Technology Gurus are fast to note that cybercrime-relatedactivities are among the major stumbling blocks of data security. Forexample, hacking has been in existence in society for as early as thefirst years of the 21st century, but no one, in particular, has beenable to counter the threats it impacts in the world today.

Inyet another point of view, data security comes with the limitation ofidentity theft, which has been rated among the sneakiest contemporarymatters. Identity theft is a situation where a hacker or an onlineinfiltrator has the chance of either intentionally or accidentallyends up accessing the personal data of undoubting users andimpersonates them. In most developed countries like the United Statesof America, cases of identity theft are far on the rise following thevulnerability of confidential user files and data. Once an identitythief assumes the person they want to be, they may predispose thesocial, academic and professional lives of the users devoid of theusers’ permissions. As bad as it sounds on paper, it does notappear to be so in real life situations. In fact, identity theft cannot only result in physical harm to the user but also psychologicaltorture at the worry of the several possible crimes that theinfiltrator is capable of committing in their name (Qasimi 78).


Hackingis one of the contemporary matters in the current state of affairsthat is better solved once and for all rather than coming up withrecommendations that may or may not work entirely depending on thereception and implementation. On that note, the first suggestionmeant to counter the risk of failed data security procedures is theuse of highly advanced security verification steps. For example,consider the case of Gmail. The corporation is quite intense with itssafety matters of all the users. Gmail has ensured that it hasdesigned a two-step verification technique that requires the user toinput more than two different passwords for every login attempt made.This move ensures that even the average hacker has no power to accessthe data in the account without the consent of the user.

Onthe other hand, identity theft can be solved by simply enhancingsecurity vigilance. The fact that data security has the soleobjective of seeing to it that the documents that were initiallyacquired and stored by a user remain within appropriate statuses,right from the beginning to the end, means that informationtechnology firms must use competency based skills to employ expertswith the right knowledge and expertise. When one unskilled employeeis given the responsibility of managing a sensitive part of datasecuring, and he fails to meet the required level of expectations,chances are the organization might become susceptible to foreignattacks (Qasimi 58). One of the worst nightmares of InformationTechnology firms is the fear of being hacked especially in themainframe computers. This is best solved by employing the idealworkers in the right places.


Atthe mention of the phrase data security, what comes to the minds ofseveral researchers is the ability to save costs and maximize theproductivity of the business. Data security does not require alarge-scale installation of software and hardware, but rather thestrategies of different information technology firms. For example, anenterprise that aims to enhance its reliability will cut down on theuse of tangible storage devices such as exterior hard disks. Thismove will prove to be not only cost-efficient but also user-friendlyas it allows all types of consumers to access their personal datarespectively at ease, at the convenience of their privacy andhappiness. On the other hand, for firms that aim to minimize thenumber of users to prove their reliability, the use of separatestorage devices may or may not be necessary depending on themanagement of the organization.

Mostimportantly data security is convenient in the sense that theorganization can set its headquarters at any place of its liking andchoice. This means that unlike several other businesses that requirethe permanent location of their respective stores, most IT firms havethe power of outsourcing the potential of the company by occasionallylending the servers to users or organizations that require it waymore than they do (Qasimi 73). Through this far-fetched idea, itbecomes quite clear that the business can still operate using itsroutine, but instead of enjoying the same economies of scale, themargin is stretched thus the firm ends up receiving more than theyinitially received. The above notions may seem like benefits, but inan apparent scrutiny, they will be proved to be more of costs asopposed to risks involved.


Whenit comes to the economic grounds, data security proves to save quitean impressive amount of money. Practically, data protection saves alot of information that could otherwise be done manually. A companyor organization that has many employees doing most of the recordkeeping manually or in other words saving hardcopy documents needsquite a huge sum of money to pay the employees. This is because thehuman capital experience is a factor that is important and quiteexpensive to afford. Data Security keeps records in large, accuratenumbers, hence reduce the number of employees needed for the task. Asignificant amount of finances that might have otherwise beenutilized to pay the workers is therefore saved and used in othercritical sectors of the business.

Secondly,the current trade policies have made it easier to use data securitysince the currency involved is constant. Nowadays, many executivesengage in online commerce, and data security comes in a hundredpercent of the time especially during transactions. When trade ismade manually, many expenses incur during service delivery and otheradditional tasks. On the other hand, data security cuts down, many ofthese expenditures because the agreements including the costs areconstant. Data security is designed in such a way that a seller orbuyer cannot make any wrong move that disadvantages the other partyinvolved in the business. This means that the parties participatingin a business cannot succeed in adding additional expenses that werenot part of the business agreement. For example, when abusinessperson buys a good or needs a service delivered through anonline page, the expenses incurred will be the as when thetransaction took place some years back. Moreover, data security helpsa businessperson to plan and come up with a budget before anoperation, which saves income.

CaseStudies of Economic Benefits

Oneof the several merits of engaging in data security is the fact thatthe organization has the potential of minimizing the level of humanlabor that is inputted in the day-to-day operations of the firms.Once this happens, it becomes clear that economies of scale will keephiking by the passage of each second. For example, consider the caseexample of an entrepreneur that manages an Information TechnologyFirm who has ventured in a variety of e-commerce and other virtualprospects. He is well-aware of the fact that the modern world hasbeen globalized and the only way to ensure that the security of hisdata is not by any chance compromised is through setting up exquisitesecurity matrices that cannot be penetrated even by the preeminentadvanced criminals (Mitra 66).

Inrelation to this, it is evident that minimizing the number ofemployees working for his firm will not only improve the productivityof his company but will also enhance the quality of the services heis providing. Moreover, it will also appear as an economic benefitsuppose the firm would consider widening the scope of the servicesbeing offered. For instance, instead of the company strictlyproviding data security practices, it can stretch the limits of itsjurisdictional boundaries through offering other InformationTechnology concepts like Computer Security.

CaseStudies of Economic Disadvantages

Amajor setback in this type of profession is the fear to lose datathat were initially stored by the entrepreneur of the organization.As mentioned in the earlier bits of the study, cybercrime-relatedactivities such as hacking have the potential of rendering thefirewall of a given organization completely, thus giving thecustomers the impression that the organization is not in full controlof itself. Therefore, they end up losing confidence and trust in allthe matters of the organization. Once this occurs, there are chancesthat the vendors may in one way or the other end up preferring othersimilar organization that offer the same services with betterassurance of protection of their personal data (Mitra 76). Forinstance, if a hacker hacks an entrepreneur’s firm in an attempt toaccess private Customer data if he is successful, he is bound tocause a whole lot of crimes ranging identity theft down the list ofreal impersonation.

Inaccumulation to that, it is wise to note that the above case study isonly a sneak peak preview of the possibilities of setting up adefenseless Data Security Firm. Another example of a case study ofthe demerits of data security is the failure to recover confidentialcustomer information. For illustration, give or take the fact thatthe firm has been hacked, it may be entirely impossible to secureback the sensitive data of all clients once it gets in the hands ofthe cyber criminals.

DataSecurity: Decision Making

Oneof the primary purposes of data security is saving files that can bereviewed time to time. This means that the records almost neverchanges over an extended period. When it comes to business and allother work environments, permanent records are an important part ofwhat a company or organization needs to achieve goals and stick totheir missions and visions. The consistency that data securityprovides is a great deal when it comes to making decisions meant toattain certain strategies. Files that are manually saved may get lostor interfered with by other uninvolved parties which in turn becomeinconvenient in case a document is to be reviewed. On the other hand,files saved in data form remain intact since the number of peoplehandling the information is minimum. In most cases, wheneverconvenient changes are supposed to be made, a company strictly allowsone individual to perform the task. This minimizes chances of losingvaluable data or adding irrelevant information.

Moreover,a record of the changes made is also carefully saved. Hence, thisconsistency comes in handy in case the company is in a dilemma. Forexample, when a corporation is not sure of what to retain and what tolet go, they will simply review the files and check the time whenthere is positive progress and factors that contributed to it andvice versa. The consistency of online saved data also helps a companyto stick to its vision and mission ((Mitra 62). There arecircumstances where a company might make moves that completelycontradict the mission and vision statements. Hence, this consistencyis of great help whenever a company is attempting to get back on itsintended track. In simple terms, the coherence of data files is oneof the reasons why companies adhere to their original intentions.


Oneof the many aims, why data security was invented in the first place,is the fact that computer scientists saw an opportunity in saving anenormous amount of information in a single location. The advantagesthat came with this included the reduction of the tedious task whentrying to access information and the high level of securityconcerning the private files. Moreover, collective information canalso be saved for comparison purposes to eliminate the unnecessaryhistrionics. In addition to that, it is of high use when it comes tocollaborative decision making. Data security stores documents in sucha way that a lot of variables can be viewed together hencesimplifying the comparison.

Nevertheless,when a group of executives feels the need to consult with each otherabout a business strategy that is best for a company, they simplydistinguish between the ones that lead to poor production and thosethat result in high production. Since they have the ability toobserve all the trends in one page, it is easier for them to come toa valid conclusion where every executive will be satisfied based onthe evidence provided. There may be situations when an enterprise isfalling, and the management team needs advice from other competingcompanies. They would just view the online information about thesebusinesses, decide on the one that has the best productivity andchoose it for their new intended strategy. When it comes decisionmaking, not only is the management team involved, but also thecustomers to whom the services are delivered are also indirectly partof it.

DataSecurity and Its Impacts on Ethical Practices

Itserves as an unwritten rule for all entrepreneurs to venture inprospects that are lucrative and harmless to the society and everyoneelse in it. This just means that it applies to all managers of everyorganization to make sure that the whole process of production oftheir particular commodities they intend to bring to the market doesnot tamper with the economic, social or political stature of thesociety.

Idealethical practices demand that no matter how profitable business mayprove to be, there is no exception to the limit to which its sideeffects can influence the growth and development of society. Inrelation to that, data security has been ascertained to be moreethical than unethical following the fact that it not only enhancescohesion which in turn boosts unity, but it also helps to narrow thesocial gap, which exists between diverse groups.

Thecodes of conduct of ethical practices demand that all business needsshould oblige to the set standards of universal concepts of morality.This gives managers of data security firms the idea that their lineof the profession entails more than merely acquiring customer data,storage and securing it for future use. Ideal Data Security Engineershave mastered the art of involving all the stakeholders of thebusiness in the conventional decision-making processes of theorganization. In addition to that, as soon as the minor shareholdersof the company are involved in the activities of the organization,they tend to feel they belong to something bigger in life. This thenenriches ethical matters (Shaw 81).

DataSecurity and Internationalization of a Business

Itso happens that no matter how menial an industry may seem to be, themanagers usually have an objective of hitting the internationalmarket at one time of their financial years. Internationalization ofa business means that the company that was once based on a particularregion has acquired enough market coverage to enable it to stretchits wings to wider market boundaries.

Datasecurity and internationalization of business will only come hand inhand, suppose the organization invested a massive amount of resourcesto maximize the productivity of the firm. International customers ofdata security will feel more confident and relaxed given that thelocal clients of that particular business have vouched for itsauthenticity (Qasimi, 64). Therefore, it is wise to assume that datasecurity can be used a better platform to maximize the market of thebusiness by providing assurances to foreign customers through theutilization of the assurance originating from the regional clients.

Mostimportantly, internationalization has more benefits than risksconsidering that it exposes the business to a whole lot of otherpotential business opportunities by interacting with people from allcorners of the world. Merging the idea of safeguarding sensitive datawith taking the business to a higher or rather cutting-edge level ismore promising than maintaining the same position for far too long(Shaw 97). After completing a financial year, the managers usuallyhope that they will elevate the throughput of the business as thiswill give them an upper hand over competing firms that offer the samecommodities and services it has specialized in. Based on the abovefacts, it is now evident that internationalization of a data securityfirm will be more of a merit than a setback.


Datasecurity has led to significant advances in the United States, one ofthem being offering employment for many individuals. For starters,quite some people do not have the experience of how to deal withonline data, hence the need to employ people that know how to handlecomputers with required intelligence. Individuals that have majoredin computer science, therefore get opportunities to work in theseareas.

Moreover,data security is currently used in almost all work environments.Hence, there are numerous opportunities for many employees to earnfrom operating the machines containing information. Data security isalso comprised of several software and programs, which cannot behandled by a single individual. Some programs would not be operatedat the same time. Thus, many employees will be required to completeseveral tasks within a short period.

Additionally,data security has improved the economy of the United States throughoffering the employment openings. When a huge population of citizensis employed, the income of the country as a whole improves. Workenables individuals to engage in other kinds of businessestherefore, the fair transactions made during these agreementsincreases the total economic cost. The data saving machinesthemselves also improves the economy through foreign currency. Sincenearly all nations are always eager to know the next level oftechnology, they are always ready to purchase technological equipmentfrom the United States and other technology manufacturing countries.This will happen no matter the cost of this equipment. Since they arepurchased in bulk, the total foreign currency that is earned turnsout tremendous improves the economy of the country incredibly.

Awayfrom that, data security also causes loss of jobs in the UnitedStates. Over the recent years, employees have become a prominent partof business. Human Capital was and is still considered useful incompanies. This is because human knowledge, skills, and experiencesapplication in workplaces are an essential part of a strategy.However, data security as part of technology has immensely replacedemployees in many business organizations. It happens that these datasaving machines have replaced work that was previously performedmanually. Quite some employees have in turn lost their jobs.Moreover, these employees do not always have a guarantee of beingcompensated hence they remain unemployed. Though data securitycreates job opportunities at a high rate, it also leads tounemployment at a similar rate.

FurtherRequired Improvements

Basedon the above revelations, it is evident that for every new dawn,technology will keep advancing, giving the IT experts a difficulttime to be updated with all the latest algorithms that provide thebest results. Regarding data security, what IT professionals need toconsider as part of the improvement is creating new storage unitsapart from just thin air. If Information Technology could get to aplace where loads and loads of files and documents both personal andpublic can be stored in a safer place other than just clouding it,then it would be wise to conclude that growth and development areheaded in the right direction (Qasimi 47).

Furthermore,data security can be merged with another major category ofInformation Technology so that the defenses of both of theirrespective firewalls can be enhanced. Through combined efforts ofboth of the Data Insecurity Experts as well as the Computer SecurityProfessionals, there is no ruling out the limit to which theintensity of their security firewall is capable of reaching.According to the rule of economics, one of the best moves that can beused to save a firm that is set to a dead end is the ideology ofmerging.

Futureof Data Security

Accordingto reality, there is no possible way to tell what will happen in thefuture. The uncertainty of future events stands on the verge of totalprediction as cases of misappropriating weather forecasts have beenprevalent in society for far too long now. On the other hand,according to Science, there is indeed an ideal way to predict thefuture and the future of data security stands at the edge of a sharpfence suppose Information Technology Experts failed to ultimatelycurb the unending list of cybercrime-related activities (Shaw 120).

Inconclusion, cyber security is beyond any of difficult tasks everdiscovered in the entire world. Watching over the personalinformation of more than fifty billion people in the whole world isalmost like entrusting the safety of a golden goose to a child. Inthis case, the chances are that the child may or may not devote allhis attention to the egg rendering it prone to risk such as breakage,or he may give it everything he has to offer. This follows that theonly way to be sure of the repercussions of delegating a child withthe responsibility of manning a golden goose is to ensure that thechild is raised and trained to meet the expected standards. The sameconcepts apply to data security.


Mitra,Ananda. DigitalSecurity: Cyber Terror and Security.New York. Wiley and Sons. 2012. Print.

Qasimi,Lubna Al. CyberLaw and in Developing and Emerging Economies. NewYork. Green haven Press. 2011. Print.

Shaw,William. Cybersecurity for SCADA Systems.Cambridge. University of Harvard Printing Press. 2014. Print.

Close Menu