Reflection
Cyber threats are a common threat in today's internet world. According to Statista report,
as of 2017, 6% of global internets users had their account hacked online. Malwares and viruses
infections are the most prevalent attacks at 16% of the experienced attacks. Organizations should,
therefore, be careful with passwords and login IDs since they hold sensitive information. One way
that organizations can protect their logins ID and password is to employ the Advanced Persistent
Threats (APTs) methods, which are used to gain access to organizational networks by the hacker.
One of the persistent APTs organizations is phishing attacks via emails. Unsuspecting users can
install viruses and malwares from the organization's computer network and can easily corrupt or
leak personal and organizational data to unauthorized sources (Chen. Desmet & Huygens,2014).
Therefore, it becomes the organization's responsibility to secure their data on the internet
and implement enough firewalls from unethical access and hackers. A team of cyber specialists is
required to keep watch on spams that may flow into the system to gain access or delete the vital
information from the system. Therefore, it is highly recommended that organizations employ a
team of smart cybersecurity guards in the form of the team to ensure the safety of the organization
in today's information technology world. Computer security analysts are essential for an
organization because they can help keep the network system updated and also install antispam
software, filters as well as software to help thwart cyber-attacks. Training employees, though it is
expensive, is a crucial exercise if the organization will be able to combat cybercrimes. Training
Employees for the organization such as the military might be unrealistic, given that there are over
1.3M active duty military and over 800,0000 in reserve forces by (Governing, 2017). Thus, in
this case, however, the U.S. military must be to train to employ certified ethical hackers (CEH) to
work alongside the computer security analysts to train and initiate a training and awareness
COMPUTER SCIENCES 3
campaign. Such a campaign should be on-going given that the cyber-attacks keep on evolving as
a result of the rapidly changing environment.
The CEH is a qualification obtained by validation of knowledge where an expert can
assess the organizations security systems through the exploration of weaknesses and
vulnerabilities within the traget systems, using tools such as the malicious hacker would use.
They would also be able to adequately test individual employees through simulated tests to
identify the most vulnerable group within the military. CEH course is designed for generating
ethical hackers that are employed in an organization to safeguard the cyber system using domain
knowledge and tools as a malicious hacker but legitimately and legally. CEH has now become
essential and vital for any software engineer, and he needs to be acquainted with all the possible
hacking methods and basic safeguard technology. The CEH course enforces on the latest malware
attacks, current hacking tools, and future haking tools. Different case studies are discussed in the
course duration so that the ethical hackers are fully trained to cope up with any hacking scenario.
CEH is also accredited by the American National Standard Institute within the U.S. Department
of Defence’s data assurance workforce, among other recognition globally (Oriyano, 2016).
COMPUTER SCIENCES 4
References
Chen, P., Desmet, L., & Huygens, C. (2014, September). A study on advanced persistent threats.
In IFIP International Conference on Communications and Multimedia Security (pp. 63-
72). Springer, Berlin, Heidelberg.
Governing (2017). Military Active-Duty Personnel, Civilians By State. Retrieved from
https://www.governing.com/gov-data/public-workforce-salaries/military-civilian-active-
duty-employee-workforce-numbers-by-state.html
Oriyano, S. P. (2016). CEH certified ethical hacker study guide: version 9. Sybex.
Statista (2017). Most commonly encountered cyber threats according to Global internet users…
Retrieved from https://www.statista.com/statistics/767612/most-common-cyber-threats-