Tuesday, June 4, 2019
Social Policy Essays Cyber Security Information
Social Policy Essays Cyber Security InformationCyber Security InformationThe Effectiveness of US Cyber SecurityThe inevitable and continuous advancement in applied science brings the terror of cyber dilemma. There are many risks that involved the cyber populace. Among these are the viruses that are erasing the clay, hackers breaking into your system and altering files, people using your electronic computer to attack another(prenominal)s, soulfulness stealing you credit card tuition to declare his own purchase. Hackers and terrorist attacks prompted the mandate on cyber security. When we say cyber security, we are dealing with the prevention, detection and retort to attacks involving information in your computers. According to Mr. Richard Clarke, Todays IT security threats are increasingly rivet on stealing valuable data. In this environment, relying on outdated measures like focalisation exclusively on perimeter security is insufficient.Get help with your essay from our e xpert essay writersGlimpse on Cyber SecurityInformation technology is perpetually changing. People are more adept to computers nowadays. Communications, transportation, entertainment, shopping medicine are greatly controlled by computers and the internet. A large percentage of the daily activities of an average person have been utilized in the presence of these breakthrough technologies. True enough, the idea of storing your personal information in your own computer or to other computer is very promising.Just quaternion years ago, security experts have not been meeting their points on whether US administration has protected the cyber world properly. But the plainly thing that they have agreed upon is the fact the increased threat produced in mainframe systems which are running in Windows and connecting to the profit. It has been the dilemma on bureaucratic system and the lack of focus in the people involved in the task that makes us more susceptible to cyber problems. Another compelling reason is the fact that four years ago, threats on information structure, specifically on mainframe, is not considered as a threat at all. No solid attention has been given in the issue.On the other aspects, US allotted big budget in the protection of the cyberspace. But the lack of concern and wrong set of priorities seems to put the problem at bay. Although, it has been suggested throughout that people should be well-informed in the latest threats and vulnerabilities, the issue still exists as of today.Cyber Security TodayEvery bit of information throughout the Internet could be monitored by the presidency. This is going to be a very thorny development. This is how the US government would like to do in response to cyber space threats. All communications made in the Internet should be read by the federal government. In this scenario, the people willing be agonistic to give up the right to privacy in order to protect security, public transportation and other critical p rocedures made in the Internet. The fact of the Internet being an open database makes it more susceptible to vulnerable attacks. The security of the information systems is largely a matter of consistent and applicable methods.Another step in cyber security is providing a Wikipedia style of database wherein the agencies can share different views and information regarding the matter.Despite the effort of the US government, some people say that the federal government has failed to reinforce the outbreak of cyber crimes. It already cost their economy billions of dollars yet they failed to respond with enough resources, determination.The U.S. government has not devoted the leadership and energy that this issue needs, verbalise Paul Kurtz, a former administration homeland and cybersecurity adviser. Its been neglected.The White House has allotted $154 in protect the cyber space yet they are more focused on online espionage than the international criminals lurking in the World Wide Web. In this aspect, the expected loss in the years to come is expected to reach a blue percentage.Congress has either failed to pass bills or sent ineffective legislation to the president. Agencies have shied away from imposing regulations. Leaders have not bothered to make sure computer users understand the problem if the officials themselves even comprehend the threats.Overall, I was amazed at the lack of knowledge, not only among presidential staff, but at the Cabinet level, and the Senate and House, McAfee Chief Executive Dave DeWalt said after meeting in the summer with senators, Congress members and Cabinet secretaries about information security. The threats arent easily grasped U.S. Rep. Zoe Lofgren, D-San Jose, whose district includes much(prenominal) of Silicon Valley, is one of Capitol Hills most Internet-savvy legislators. Yet even Lofgren, when asked in August if she knew what a botnet is, responded only with, Sort of. Her spokesman said most other members of Congress prob ably could not even make that claim. (Sean Garret (2007)).Last November 2007, a bill has been passed that will prosecute cybercrime cases and allow victims to have restitution.Weaknesses of Cyber Security PoliciesAccessing all the information of other people will give you safety is the same things that once in the brains of Hitler and Stalin, and also Mao. They each have their own spies to feed the necessary information in various matters that they assumed that can make them safe. In other words, the same things are the ones being conceptualized was once in the minds of these famous dictators.Although admittedly, going against the plans of the US government is not a very bright idea considering the fact that the people are the key reasons of the cyberspace threats and vulnerabilities. If the people have already resigned in protecting the cyber world, the only thing left is the government to do the work.Strength of Cyber Security PoliciesIt is a good thing that the federal government can provide plentiful budget in combating cyber space problems. The key to guarantee the best tools in doing so is having the proper financial allocation. Although, online espionage is the main priority of the US government, I must(prenominal) admit it is still a good tactics. Once the government gets hold of the people behind it, they will able to fully learn the principles in online threats. In this way, they can be able to apply whatever they have encountered in other aspects of cyber space dilemma such as online theft.The Wikipedia style of platform is so far a very good idea. An access to different strategies of key people and agencies is a way of learning to everyone. Application of these strategies will be facilitatory in minimizing the alarming losses contributed by the World Wide Web.Even though, combating the cyber space terrorists, passing a bill that reinforce the fair play to take actions in administering charges and victims being able to seek retribution are a goo d step. It at least will put a defensive strategy in protecting the user of the World Wide Web.News.com enumerates the provision of the bill. Existing law would bechanged so that federal prosecutors can go after supsected cybercriminals even if the crime occurs within a single state (currently, hackers must engage in criminal activity across state lines for federal prosecutors to get involved). The current law would also be made tougher by removing a requirement that computer crimes have to result ina loss of atleast $5,000 in the lead prosecutors can pursue the case. It wouldbecome a felony, punishable by fines and up to five years in prison,to damage 10 or more computers with spyware or keyloggers. It would become a crime, also punishable by fines and up to five years in prison, to use the threat of hacking intosomeones computer to extort money or anything else of value. Cybercriminals would beforced to give up any property used to commit their crimes or obtained in the process of those activities.Cyber Security A QuestIt will be a long-standing effort to fully eliminate the troubles brought about by the cyber criminals. At the same time, the issue of cyber security should always be our main concern. technology is changing. We must keep our pace with the advancement of the modern world. These instances just further strengthen the fact on the everyday changes in the information technology. Digital world is at hand. The solution to our cyber space dilemma is also at hand. The decision lies on us.BibliographyLyman, Jay (2004). Is U.S. cyber-security policy leaving critical mainframe systems at risk? October 18, 2004, from http//www.linux.com/ bear/39583Jones, K.C. (2008). National Intelligence Director Wants To Monitor All Net Communications. January 18, 2008, from http//www.informationweek.com/management/showArticle.jhtml?articleID=205901409Tech Policy Central (2008). Govt.s Fight Against Terrorism Hitting Net. January 21, 2008, from http//www.techpolicycentr al.com/2008/01/govts-fight-against-terrorism.phpGarett, Sean (2007). The Great Cybercrime Delusion. November 13, 2007, from http//463.blogs.com/the_463/2007/11/the-great-cyber.htmlTech Policy Central (2007). Senate Committee Passes Cybercrime Bill. November 2, 2007, from http//www.techpolicycentral.com/2007/11/senate-committee-passes-cyberc.php
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.