CS 1010 Unit VIII Article Critique

Unit VIII Article Critique

Columbia Southern University

Computer Essentials

Computerized programming is a type of logic we create using programming languages to perform a single task. It may happen that that one block of code may perform a single subtask, and by combining these similar code blocks, we can achieve a larger goal. It doesn’t matter in what language the program is written; the main motto should be that the objective of executing the task is correctly performed. Computer programs can also be embedded into machines like refrigerators, air conditioners etc. Then this program will help to orchestrate the complex hardware parts to perform a single task of cooling. That being said, computer programming is also embedded in almost every business currently in existence in one form or another. Whether it is through their scheduling, or book keeping, or through the use of programs in order to actually perform the business task at hand. “Whether it’s an HVAC system, a point-of sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property” (Meyers, C, 2017). If your cyber system is hacked, it can lead to huge repercussions throughout your business, and compromise the integrity of the whole, and as this article states, it seems that the security industry is not exceeding any expectations in achieving actual complete security. It seems that the hackers are always a step or so ahead of the security teams attempting to stop them, in an area where advancements are rapidly occurring.

The author of this article Claire Meyer, believes as I do, that the industry is not doing well. In the article it is said that when it comes to “the investment and preparedness, the industry is not doing well,” and “Cybersecurity concerns seem to be addressed primarily as an afterthought by both the end users and the physical security hardware/ software manufacturers,” (Meyers, C, 2017). Between a combination of delegating the task of security to inadequate people who are either not aware of the companies protocols, or just not experts in the field, to the belief that many manufacturers have been high selling ease of use programs which just aren’t that secure. It is apparent that cyber security has not been taken seriously by either side of the coin whose job it is to do so. The author states when asking the question, “Whose job is it anyway,” that it is the responsibility of everyone involved in order to assure the highest level of security. Cyber security is much like anything with three legs, if you take away one, it can not stand. The three pieces of cyber security are the people, processes, and products, which all combine to make our companies safe. People being the product makers, and users, need to ensure that the processes being followed are adequate and successful in achieving the goals. The processes may be designed by the security company, or those set in place by the company the security is for, need to be well tested and proven to work. The products will generally be created by the service providers, but one needs to remember that if they don’t ask for something in the product, they may in fact not get something they thought would automatically be included.

I agree with the article and its author in regards to whose job it is, and the poor job being done by those involved. While it is stated that “There are some security technology manufacturers and service providers that are making a concerted effort to improve cybersecurity and users’ and integrators’ awareness of vulnerabilities,” (Meyers, C, 2017). Many more providers and users are falling short of the mark. It is imperative that the necessary information be provided to the users in order to assure they are assisting in the process rather than hindering the efforts, and it is equally as important that the users question whether or not they have all of the pertinent knowledge. It is important that you have cyber security to begin with, but it is more so important that you have it in a manner that actually works and is proactive in its efforts. “One of the key benchmarks to determine whether or not a security vendor or integrator is focused on cybersecurity is to ask them about it,” if you don’t ask, and they don’t tell, the fault is shared equally, and both parties will end up suffering when something goes awry. In order to reassure yourself and your company that everything necessary is being done, it is also important to make a change to your security provider if they are not meeting and or exceeding your expectations. Yes some companies may be cheaper or more expensive than others, but it can be said, that “you get what you pay for,” in this case. The sooner companies realize the importance of their cyber information and data, the better off we will all be.

In conclusion, I believe that as a whole, cyber security is being handled in to lackadaisical a manner, and that both providers and users need to step up their interest and attention to this area. Companies and customers alike suffer whenever there is a breach of cyber security, and it can be pivotal to the rise or fall of a business depending on how these matters are handled. “The bigger your castle, the more ways there are to get into it,” (Meyers, C, 2017). and once somebody is inside your “castle” or system, it is difficult to say the least, to get them out. If you imagined that all of your cyber security was designed to prevent someone from gaining access to your personal bank account, most people would take it quite a bit more seriously than they currently do. This article and its author have made some very valid points with which I agree, that the industry is just “not doing well,” (Meyers, C, 2017). I also concur that the solution may lie in us as users being more cognitive of our needs and desires. “The more awareness we as an industry bring to cybersecurity, the more manufacturers will add it to their product sets and offerings,” (Meyers, C, 2017). Cyber security is imperative to any business large or small, and we collectively need to get a grip on it rather than let hackers steal into our lives unseen.

References

Meyer, C. (2017). When Cyber Met Physical: It’s Time to Evaluate Your Security System’s Cyber Risks. Security: Solutions For Enterprise Security Leaders, 54(4), 36-38.

Place an Order

Plagiarism Free!

Scroll to Top