This website uses cookies to ensure you have the best experience. Learn more

Cyber Security Essay

2577 words - 11 pages


Cyber crime:Law Enforcement And E-Government
Transnational Issues

Individ ual Assignment #1



Table Of Content

Introduction ................................................................. 3-5
Current Government Interventions/ Methods............. 5-7
linpact/Effects .............................................................. 7-8
Private Industry Rcsponsibilit)' ............................... 8-9
Conclusion ........................................................................ 9-10
Reference Page ........................................................... 11

Introd uction
Over the last several years we have witnessed many ...view middle of the document...

Today.a criminal has the ability to
rob you from the comfort of his or her own home uow. and with Lhe consumer having no
knowledge of U1e criminal act al all u ntil it has occmred and is too late. Uufortu nalely,
because it has become increasingly harder to track: theJ>e cyber criminals and their
locations, the nu mbers of cyber robberies have grown astronomically.
Cyber threats are increasingl y becoming the major factor in the economic
turbulence of this nation as well as threaten the integrity of the nations security systems

(Amerding. 2012). Expansion of the World Wide Web is now allowi11g cyber criminals to
have the ability to hack into some of the most sophisticated and l1
ighly protected
confidential networks. We have repeatedly witnessed that cyber criminals arc not just
taking money from tl1 in the lower class. but those at the top of the lax bracket as well
(Baker, 2006). They have advanced their hacking so much that they now have the ability
to take money from governmental organizations that are foderally protected and
com promising the national security of many countries.Thus, the government has been
forced to set policies, procedures and cc11 practices to lessen the chance ofconsumcrs
being vulnera ble to any attacks. but they do not seem to be enough .
With the memory of the terrorist attacks of Septem ber I I becoming ever more
distant.congress passing another piece of homela nd security legislation seems to be more
and more of a distant t hought as well. Unfortunately, there has been little support for
taking on yet another major piece of com plex and costly homeland securi ty legislation.
The government's options are steadily becoming limited and they must act to increase
and enha nce their cyber security protection measurements to ensw-e a cyber attack will
not happen. Another issue ofJelevance pe11ains lo the cyber-criminal ability lo allack
power grids. If a cyber-criminal were able lo hack a power grid it would cause
detrimental problems for the l'cderal government and the American people including but
not limited to blackouts, encryption errors, and a total system meltdown .
Privates indust ry is a nother sector that has been getti ng l1 hard in cyber
criminal activity.The private industry has accounted for al least 65% of the cyber attacks
in the United States (Homeland Security. 2005). With that being said, we must remem ber
that the federal government and private industry have many tics and connections to each

other in many ways. This warrants a necessa1y strong and cohesive partnershi p for the
protection of governmental function bu t also lo make sure other organizations arc
properly equipped with the best policies, procedures. and regulations. Instead, we can
find that for different reasons t he p1i vate industry does not want to u pgrade their cyber
secutity protection levels, where the Federal government believes that action must be
taken now to protect...

Other Essays Like Cyber Security

Cyber Crime Trends Essay

1821 words - 8 pages respondents say they are always aware of cyber crime, many are not taking the necessary precautions. Forty-one percent of adults indicated they don't have an up to date security software suite to protect their personal information online. In addition, less than half review credit card statements regularly for fraud (47 percent), and 61 percent don't use complex passwords or change them regularly. Among those who access the Internet via their mobile

Computers In Homeland Security Essay

971 words - 4 pages the government relies on to ensure that we are all safe. One important part of the Homeland Security is the US-CERT. The US-CERT program was invented in 2003, and severs as our internet infrastructure. This branch of Homeland Security is run by the National Cyber Security Division. The acting director of US-CERT is Donald A. Purdy Jr. It protects our internet from cyber attacks. This technology is responsible for analyzing and

Living in the Age of Cyber Attacks and Cyber Warfare

2381 words - 10 pages these cyber attacks on a domestic and international scale, and knowing what to expect in the future while living in a world dominated by virtual experiences. The scary thing is that attacks like that are very real and pose an imminent threat to the U.S. and its allies. In fact, after viewing the movie War Games in 1983, President Ronald Reagan tasked his advisors with finding out if hacking into national security systems was a legitimate threat. He

Network Security


Cyber Terrorism

1587 words - 7 pages , politically, motivated attack against noncombatant targets by subnational groups or clandestine agents” (Cyber-Terrorism 1). These cyber-attacks have great reason to cause unease. Internet security professionals have expressed their increasing concern of the frequency of the attacks against the Internet. This is a very troubling trend as the terrorists learn and adapt from every attack what works and what doesn’t, what vulnerabilities they

Metacognitive Writing Assignment

1195 words - 5 pages Sherief Beshara ENG 302-DeFazio Metacognitive Assignment Role of Cyber Security in Preventing Future Attacks 1. Copy/paste the following items from your major scholarly project into your Metacognitive Assignment document: * One of the main concerns is whether or not we are prepared for a cyber war. We have to equip ourselves with the education and understanding of what goes into preventing a cyber-attack and what we need to be on the

Cyber Terrorism

787 words - 4 pages , tracing another person's computer and Internet activity, and electronic identity theft. Cyber-theft such as Credit fraud is another common form of cyber crime. Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your Social Security number, credit card number and home address. This information will e used by the hacker for his own means. An activity that often gives rise to criminal

Cyber Vulnerabilities

1387 words - 6 pages INTRODUCTION With cyber-attacks on the continuous rise, organizations public and private must address computer security vulnerabilities. SANS Institute has revealed “unpatched client-side software applications” as the top priority vulnerability for organizations globally. In conjunction with unpatched client software, vulnerable “Internet-facing web sites” can result in an organizations infrastructure to be compromised. In this study I will

Cyber Crime

1744 words - 7 pages even without having any sort of financial gain from it. The Digital Millennium Copyright Act (DMCA) passed in 1998 made it serious criminal offense to find a way around security blocks placed on software products by its manufactures to prevent the coping of the product. All forms of cyber crime are intentional and are very dangerous to all. There are ways of prevention of becoming a victim and should be used as often as possible. One way of

Assignment Information Use Paper

671 words - 3 pages . What I’m trying to learn programmer C++ TCP/IP network. Also I want to learn anytime of network security programs. I’m trying to become a cyber security for my job in future. I know I need to the follow requirement to become a cyber security If you'd like to train to become a cyber security specialist, you should obtain a 4-year bachelor's degree in computer programming, computer science, information science or computer engineering. English

Cybersecurity Standards: a Case Study on Malaysian Banking Sector

1977 words - 8 pages RISK Copyright © 2013 CyberSecurity Malaysia 4 HIGH LEVEL USAGE = HIGH RISK Cyber Security Incidents (1997-2013) Reported to Cyber999 Help Centre 16,000 15,218 Type of incidents: 14,000 • • • • • • • • 12,000 10,000 8,000 As at 31st August 2013 Fraud and scams Intrusion and web defacement Destruction Denial-of-Service Virus / Malware Harassment Content-related Intrusion

Related Papers

Cyber Security Essay

521 words - 3 pages An Opinion on DoD Organization or Direction Cyber 200 H 11 Jun 2014 Layer 2 Switch The Army’s current force modernization proponent structure lacks the institutional unity of effort needed to effectively determine Doctrine, Organizational, Training, Material, Leadership/education, Personnel, and Facility (DOTMLPF) requirements, to execute force management responsibilities, and conduct integrated force and capability development for

Cyber Security Essay

605 words - 3 pages Escalating cyber-attacks on the general public and distinct divisions such as the immediate neighborhood, nationwide, and worldwide level have stimulated an increase in financing and support for the examination of increased cyber security enhancements. The purpose of this paper is to discuss the new technologies for boosting cyber security in a local level, national level and in the Global level. The paper focuses on pointing out the mandate

Exploration Of Cyber Security As A Public Good

2319 words - 10 pages Exploration of Cyber Security as a Public Good 1) How can government justify telling private industry how to set up or improve their cyber security? “President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter” (U.S. White House Office, 2010). Today, more than ever, society

How Will The Advancement Of Cyber Security Affect Communication On Social Media?

2183 words - 9 pages 1 ENC1102 CMB Final Research Proposal Introduction and Articulation of Problem or Topic: I selected a Cyber Security topic because it is a big concern for me how my information (the data) is stored online. This is a topic that everybody worries about because nobody knows where the cloud is or who has access to it. It seems to me that every week there are new headlines about hackers bringing an organization to its knees by doing things