Cyber security is gaining tremendous attention nowadays due to the increasing use of internet, computers by the media and various public and private institutions. They recognize the terrible impacts with the cyber attacks. At present, cyber attacks has resulted in computer based criminal activities which are generating worldwide threat, destruction and disruption. There is no cross border for cyber activities and the increase in the use of internet by the world wide users and lack of international cyber legal regime resulting the increase of the international cyber attacks. Cyber security involves preventative methods which are used to protect information from being stolen or attacked. Computer crime or cyber attack has become a widespread problem since the evolution of Information Systems. Cyber attack is a crime that involves a computer and a network. Cyber crime or a cyber attack is an attack where a person uses a computer to commit an illegal act. Cyber attack is a current emerging issue to all the sectors around the world.
2.2 Introduction to Cyber Space
There are no internationally agreed or legally binding definitions of ‘cyberspace’, ‘cyber attack’ or any other related terms. According to the Memorandum from the US Deputy Secretary of Defence, Cyber space is defined as the cyber activities can be performed for both
• Defensive and
• Offensive purposes. Defensive cyber activities include the following
• Upgrading or restoring a computer system that has been
With widespread use of internet services, the network scale is expanding on daily basis and as the network scale increases so will the scale of security threats which can be applied to system connected to the network. Viruses and Intrusions are amongst most common threats that affects computer systems. Virus attacks can be controlled by proper antivirus installation and by keeping the antivirus up to date. Whereas any unauthorized access in the computer system by an intruder can be termed as Intrusion and controlled by IDS. Intruders can be grouped into two major categories which are external and internal Intruders.
The USA Patriot Act, also known as "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism" was a rushed act passed 45 days after the devastating terrorist attack on the twin towers September 11th, 2001. It was composed with the intention of finding and prosecuting international terrorists on American soil, but consequently violated the constitution. In addition, the Patriot act allows surveillance on all emails, internet, and cell phones to try and catch terrorists. Regardless, the act ended up having more power than primarily planned as stated in the CNN debate on the patriot act. America was founded on the principle of individual liberties and the pursuit of happiness in the context
The National Security Agency also known as the NSA, it's an intelligent organization of the United States government who monitors foreign countries and collects information of people. The NSA is economically beneficial towards the government of the United States some reasons consist of the prevention of dangerous terrorist attacks, funding's in the government, and the prevention of hackers taking over the system. Though at the same time the NSA should be stopped because they have invaded the privacy of many people without their consents. Currently, the United States has been facing terrorist attack, which has caused many deaths and tragedies not only to the United States but as well towards the world.
The moment that the Twin Towers fell in New York, America became destined for change. In the wake of these attacks, the USA PATRIOT Act of 2001 was quickly passed through congress, and signed by then-president, George W. Bush. The act itself gives the FBI and other government agencies the ability to do and use certain methods, many of which are already used by other law enforcement organizations, to help prevent future terrorist attacks. Since then, this piece of legislation has been the center of much debate and controversy. But, there is ample reason to believe that the Patriot Act is needed and effective.
To begin with, Counterterrorism measures such as Biometric data collection would not flag Adam Smith as a homegrown terrorist. Even though Homeland Security’s advanced data collection and evaluation methods from have had outstanding triumphs with many foreign terrorists entering the United States. In the same fashion, administered programs such techniques are probable to yield false positives due to temporary or permanently distorted physical injuries. Furthermore, the homegrown terrorist in the U.S. is typically obedient to the laws with authentic proofs of identification with transgressions or not has not been alerted by Homeland Security as a terrorist.
Imagine for a second that every phone call you make, every text message you send, and every place you go is being constantly monitored by multiple governments. Well this is basically what the United State and United Kingdom's government is doing on a daily basis. The United States National Security Agency has been implementing projects in secret to monitoring people since 2001 but it would still be kept as a secret if Edward Snowden did not reveal this massive secret that was intruding the public’s privacy for years. The U.S. surveillance program started because of the September 9th, 2001 terrorist attack that hijacked airplanes and slammed them into the World Trade Center towers.
How do you feel about about adding more border security? Border security is a way of having more protection so people don 't come into a country where they are not from without having thier document or having permission to come into another country. I say there is no need of that because no matter how much security they have people are going to come into the country that they don 't belong in and also because there they are full of ideas to come in the country. I think there is no need of more border security because there will always be a way into the country. For an example people that are trying to cross the border, meet up with other people and pay them and they help them cross without the immigration people knowing.
Now focusing on cyber security and communication security which are the following parts that make up the national security. Each one of these parts are responsible for a specific function. Cybercrime is attacking the information systems, sometimes identity theft, but in some cases fraud. By providing insight into causes of cybercrime, its participants their motivations, then we identify some of the major issues dealing with these crimes. With cybercrime being nondiscriminatory, also dramatically increase.
On September 11, 2001 the world came to a stand still as a terroristic attack targeting our country killed 2,977 people. As fear ran high in every American house hold, the government quickly acted and on October 26 President George W. Bush passed the USA PATRIOT Act. The full title, "Uniting and Strenghtening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act", suggest how the government quickly acted in response to the new threat that we were experianceing. Although some may argue that it violates our civil liberties, the Patriot Act serves as an asset to help protect U.S. citizens by stopping terrorist attacks, giving the law enforcement tools to make investigations easier, and increases national security.
The security is overriding to improve the nation, now day security is increasing to control the terrorism. NSA Surveillance one of the agencies that provide intelligent records to the American government. Although leaking out personal information making the American uncomfortable and people started getting freak out. “I am not trying to bring down the NSA, I am working to improve the NSA. I am still working for the NSA right now.
Cybersecurity has become a growing cause for concern in the United States and indeed countries around the world. On February 9, 2016 President Barack Obama announced his Cybersecurity National Action plan (CNAP) to further the nations efforts to protect government agencies, citizens, and businesses from cyber threats domestic and abroad. However, cybersecurity is not a new issue in fact it is as old as the internet itself. With that said, I keep thinking back to that warm September day stained with the image of an enormous fireball engulfing our small TV set. This horrific day changed the course of history forever along with my future career path.
With computer technologies and the internet has connected the world together with the ability to communicate with people in different countries. As a society, we have become very dependent on computers and when the systems go down we cannot function as well, businesses cannot conduct their business. With the internet connecting the world together, it gives concerns for cyber-terrorism and cyber-attacks. Cyberterrorism is when a group attacks a target with intention of causing harm and further political, social, religious, or other goals. Cyber-attacks are attacks on a target system carried about by different people and may not be associated with a terrorist group.
"While the Internet-based economy provides many benefits, it also raises new concerns for maintaining the privacy of information. “Internet privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences.â€[1] As the federal government’s National Telecommunications and Information Administration (NTIA)[2] explains: Every day, billions of people around the world use the Internet to share ideas, conduct financial transactions, and keep in touch with family, friends, and colleagues. Users send and store personal medical data, business communications, and even intimate conversations over this global network.
Cyber threats continue to plague governments and businesses around the world. Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems. Normally there are two purposes of Cyberwarfare, espionage or sabotage. Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems. Cyber operations can also aide military operations, such as intelligence gathering and information warfare.
CYBER CRIME Cybercrime is one of the fastest growing type of crime in our society today and have also been a serious problem since it causes a lot of damages and also affect us in different ways. But before I go further let me start by telling you the meaning of cybercrime, Cybercrime is different and more heinous than normal crime that we know. This crime is committed in an electronic medium and here means read is not a requirement and is done in secret Feldman(2013). Cyber war takes place largely in secret, unknown to the general public of crimes include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war, illegal monitoring. Secondly let me talk about the effect of cybercrime in our society today.