Publisher: Forbes Magazine Essay Example
Introduction to Security: Chapter 7
Nowadays, computer networks of companies and organizations have always been attacked by hackers. To face this predicament, companies have organized a method, wherein they exchange public and private information with other companies, and supported by government incentives and regimes that would protect and reinforce computer network organizations. This was similar to the objectives of the new executive order that President Obama just signed, in which the goal was to “inspire the collective behavioral changes that are required to improve information sharing” (Udell & Kaplan, 2015, p.1). This executive order is centered on the risk brought by hackers against cyber threat information, so that by sharing information, they would be aware of the new cyber threats in the computer network. This would enable them to use this information for their protection, especially as it encloses “actionable threat information in machine-readable format” (Udell & Kaplan, 2015, p.1). It also reveals the threat trends that occur within the computer network, with the ability to track threats and the trends that go about the system. Once these threats are determined, only then can the companies create a system of defense set to facing the risks brought by hackers.
Concept / Terminology:
There are always risks that threaten organizations, especially at this time when almost everything is set on the use of the Internet, and there are always cyber threats that enter the computer networks. For this, it is important for companies and organizations to share information related to cyber threats, so that they can trace these threats and the trend that these cyber threats has been taking. However, it is not enough that companies are aware of these cyber threats in “machine-readable format” (Udell & Kaplan, 2015, p.1). They also have to understand the manner in which these threats can be barred from entering the computer network, so that they can create an effective defense for the prevention of threats. By this, they are able to combat the risks that has been threatening them, in relation to the ongoing trend, to create a more stable and secure computer network within the company.
Udell, B., & Kaplan, E. (2015, February 13). The limits of cyber threat information sharing. Retrieved February 18, 2015, from http://www.forbes.com/sites/riskmap/2015/02/13/the-limits-of-cyber-threat-information-sharing/.