Monday, August 5, 2019
Social Policy Essays Cyber Security Information
Social Policy Essays Cyber Security Information Cyber Security Information The Effectiveness of US Cyber Security The inevitable and continuous advancement in technology brings the terror of cyber dilemma. There are many risks that involved the cyber world. Among these are the viruses that are erasing the system, hackers breaking into your system and altering files, people using your computer to attack others, someone stealing you credit card information to make his own purchase. Hackers and terrorist attacks prompted the mandate on cyber security. When we say cyber security, we are dealing with the prevention, detection and response to attacks involving information in your computers. According to Mr. Richard Clarke, ââ¬Å"Todayââ¬â¢s IT security threats are increasingly focused on stealing valuable data. In this environment, relying on outdated measures like focusing exclusively on perimeter security is insufficient.â⬠Get help with your essay from our expert essay writers Glimpse on Cyber Security Information technology is continuously changing. People are more adept to computers nowadays. Communications, transportation, entertainment, shopping medicine are greatly controlled by computers and the internet. A large percentage of the daily activities of an average person have been utilized in the presence of these breakthrough technologies. True enough, the idea of storing your personal information in your own computer or to other computer is very promising. Just four years ago, security experts have not been meeting their points on whether US government has protected the cyber world properly. But the only thing that they have agreed upon is the fact the increased threat produced in mainframe systems which are running in Windows and connecting to the Internet. It has been the dilemma on bureaucratic system and the lack of focus in the people involved in the task that makes us more susceptible to cyber problems. Another compelling reason is the fact that four years ago, threats on information structure, specifically on mainframe, is not considered as a threat at all. No solid attention has been given in the issue. On the other aspects, US allotted big budget in the protection of the cyberspace. But the lack of concern and wrong set of priorities seems to put the problem at bay. Although, it has been suggested throughout that people should be well-informed in the latest threats and vulnerabilities, the issue still exists as of today. Cyber Security Today Every bit of information throughout the Internet could be monitored by the government. This is going to be a very thorny development. This is how the US government would like to do in response to cyber space threats. All communications made in the Internet should be read by the federal government. In this scenario, the people will be forced to give up the right to privacy in order to protect security, public transportation and other critical procedures made in the Internet. The fact of the Internet being an open database makes it more susceptible to vulnerable attacks. The security of the information systems is largely a matter of consistent and applicable methods. Another step in cyber security is providing a Wikipedia style of database wherein the agencies can share different views and information regarding the matter. Despite the effort of the US government, some people say that the federal government has failed to reinforce the outbreak of cybercrimes. It already cost their economy billions of dollars yet they failed to respond with enough resources, determination. The U.S. government has not devoted the leadership and energy that this issue needs, said Paul Kurtz, a former administration homeland and cybersecurity adviser. Its been neglected. The White House has allotted $154 in protecting the cyber space yet they are more focused on online espionage than the international criminals lurking in the World Wide Web. In this aspect, the expected loss in the years to come is expected to reach a high percentage. Congress has either failed to pass bills or sent ineffective legislation to the president. Agencies have shied away from imposing regulations. Leaders have not bothered to make sure computer users understand the problem if the officials themselves even comprehend the threats. Overall, I was amazed at the lack of knowledge, not only among presidential staff, but at the Cabinet level, and the Senate and House, McAfee Chief Executive Dave DeWalt said after meeting in the summer with senators, Congress members and Cabinet secretaries about information security. The threats arent easily grasped: U.S. Rep. Zoe Lofgren, D-San Jose, whose district includes much of Silicon Valley, is one of Capitol Hills most Internet-savvy legislators. Yet even Lofgren, when asked in August if she knew what a botnet is, responded only with, Sort of. Her spokesman said most other members of Congress likely could not even make that claim. (Sean Garret (2007)). Last November 2007, a bill has been passed that will prosecute cybercrime cases and allow victims to have restitution. Weaknesses of Cyber Security Policies Accessing all the information of other people will give you safety is the same things that once in the brains of Hitler and Stalin, and also Mao. They each have their own spies to feed the necessary information in various matters that they assumed that can make them safe. In other words, the same things are the ones being conceptualized was once in the minds of these famous dictators. Although admittedly, going against the plans of the US government is not a very bright idea considering the fact that the people are the key reasons of the cyberspace threats and vulnerabilities. If the people have already resigned in protecting the cyber world, the only thing left is the government to do the work. Strength of Cyber Security Policies It is a good thing that the federal government can provide ample budget in combating cyber space problems. The key to guarantee the best tools in doing so is having the proper financial allocation. Although, online espionage is the main priority of the US government, I must admit it is still a good tactics. Once the government gets hold of the people behind it, they will able to fully learn the principles in online threats. In this way, they can be able to apply whatever they have encountered in other aspects of cyber space dilemma such as online theft. The Wikipedia style of platform is so far a very good idea. An access to different strategies of key people and agencies is a way of learning to everyone. Application of these strategies will be helpful in minimizing the alarming losses contributed by the World Wide Web. Even though, combating the cyber space terrorists, passing a bill that reinforce the law to take actions in administering charges and victims being able to seek retribution are a good step. It at least will put a defensive strategy in protecting the user of the World Wide Web. News.com enumerates the provision of the bill. à · Existing law would beà changed so that federal prosecutors can go after supsected cybercriminals even if the crime occurs within a single state (currently, hackers must engage in criminal activity across state lines for federal prosecutors to get involved). à · The current law would also be made tougher by removing a requirement that computer crimes have to result inà a loss of atà least $5,000à before prosecutors can pursue the case. à · It wouldà become a felony, punishable by fines and up to five years in prison,à to damage 10 or more computers with spyware or keyloggers. à · It would become a crime, also punishable by fines and up to five years in prison, to use the threat of hacking intoà someones computer to extort money or anything else of value. à · Cybercriminals would beà forced to give up any property used to commit their crimes or obtained in the process of those activities. Cyber Security: A Quest It will be a long-standing effort to fully eliminate the troubles brought about by the cyber criminals. At the same time, the issue of cyber security should always be our main concern. Technology is changing. We must keep our pace with the advancement of the modern world. These instances just further strengthen the fact on the everyday changes in the information technology. Digital world is at hand. The solution to our cyber space dilemma is also at hand. The decision lies on us. Bibliography: Lyman, Jay (2004). Is U.S. cyber-security policy leaving critical mainframe systems at risk? October 18, 2004, from http://www.linux.com/feature/39583 Jones, K.C. (2008). National Intelligence Director Wants To Monitor All Net Communications. January 18, 2008, from http://www.informationweek.com/management/showArticle.jhtml?articleID=205901409 Tech Policy Central (2008). Govt.s Fight Against Terrorism Hitting Net. January 21, 2008, from http://www.techpolicycentral.com/2008/01/govts-fight-against-terrorism.php Garett, Sean (2007). The Great Cybercrime Delusion. November 13, 2007, from http://463.blogs.com/the_463/2007/11/the-great-cyber.html Tech Policy Central (2007). Senate Committee Passes Cybercrime Bill. November 2, 2007, from http://www.techpolicycentral.com/2007/11/senate-committee-passes-cyberc.php
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.