Major issue for system and network administrators

Assignment Help Computer Engineering
Reference no: EM131672489

Write review on this article with two references in APA format with 1 Judeo-christian view.

A major issue for system and network administrators is the ever evolving cyber threat. According to Minchev, "modern digital world is constantly presenting new challenges, resulting from cyber-physical clashes.

One of the greatest problems in the present context is adequately to react towards new threats and expected attacks in the evolving modern world," (Minchev, 2016).

The reliance on the World Wide Wed is at an all time high. Nearly everyone in the United States has a smart phone which grants them access to the Internet at any give time.

The problem is with advancing technologies comes advance threats. According to Richardson, "the need to quickly develop new methodologies to deal with the continuous plague of emerging threats to our information systems, infrastructures, and the development processes.

As the technologies on the Internet and the Web develop and increase, the available avenues of attack will only increase in both volume and complexity," (Richardson, 2013). The cyber threat will only continue to advance along with technology, one never being able to truly surpass the other. Future cyber threats could include advance technologies such as AI.

According to Whitaker, "some of these attacks have characteristics of intelligence and can be modeled as a set of collaborating software components such as those used in intelligent agents," (Whitaker, 2016). By utilizing an AI a cyber criminal could hack multiple targets at once, in significant less amount of time. In fact according to Davenport, smart computers have shown the ability to make better decisions than their human counterparts.

They now have the ability to decide, learn, predict and comprehend far faster and accurately than the human brain; and the progress for this trend is still growing, (Davenport, 2016).

As the threat grows, we must rise to except the challenge. The Bible says, "Then I heard the voice of Jehovah saying: 'Whom shall I send, and who will go for us?' And I said: 'Here I am! Send me!'" (Isaiah 6:8).

Meaning that God will always have roadblocks and tests for us in this world. It is our duty to learn from these experiences and keep moving forward. Bibliography Davenport, T. H., & Kirby, J. (2016). Only humans need apply: winners and losers in the age of smart machines. Harper Business. Minchev, Z., Dukov, G., Boyadzhiev, D., & Mateev, P. (2016).

Future Cyber Attacks Modelling & Forecasting. PROBLEMS & FINAL REPORTS, 77. Richardson, T., & Thies, C. N. (2013). Secure software design. Jones & Bartlett Publishers. Whitaker, E., & Lee-Urban, S. (2016). Intelligent Agent Representations of Malware: Analysis to Prepare for Future Cyber Threats.

In Advances in Human Factors in Cybersecurity (pp. 391-400). Springer International Publishing.

Verified Expert

The article given by student is about cyberthreats. I had to review and apply Judo Christian perspective. I have mentioned few quotes from Bible and Pope Francis to evaluate AI and new technologies.

Reference no: EM131672489

Questions Cloud

How do you think that companies will use big data in future : How do you think that these companies will use big data in the future? Will big data put researchers out of business? Include your rationale?
What is the function of the somatosensory system : Describe the functional and anatomic differences between rods and cones.What is the function of the somatosensory system?
Draft the design of a new model program : Draft the design of a new model program, not currently existent within your community. Provide a statement that introduces your proposed community program.
Prepare report to propose network design for itech company : SBM4104 IT Infrastructure Assignment Proposal - Propose an IT Infrastructure Design Solution for iTech Company.
Major issue for system and network administrators : Major issue for system and network administrators is the ever evolving cyber threat. According to Minchev, "modern digital world is constantly presenting
Develop one fictional individual who may seek career : Using the theory matched with the fictional character, write a brief explanation of how you would present the theory to the individual.
Compute the manufacturing cycle efficiency for given order : The following information relates to the average amount of time needed to complete an order: Compute the manufacturing cycle efficiency for an order.
Examine the extent to which two chosen mystifications exist : Examine the extent to which the two chosen mystifications exist in your organization or an organization with which you are familiar.
Explain the symptoms and prevalence of anorexia nervosa : A brief summary of the chosen disorder that includes symptoms, prevalence, development, and course according to the most recent version of the DSM.

Reviews

inf1672489

1/9/2018 5:26:54 AM

Each time I've utilized their administrations I am never disappointed. Attempted different organizations, however they don't measure up to the nature of work given.

len1672489

10/9/2017 1:59:01 AM

I have to write write review on this article with 2 references in APA format with 1 Judeo-christian view. A major issue for system and network administrators is the ever evolving cyber threat. Intelligent Agent Representations of Malware: Analysis to Prepare for Future Cyber Threats. In Advances in Human Factors in Cybersecurity (pp. 391-400). Springer International Publishing.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd