With computer technologies and the internet has connected the world together with the ability to communicate with people in different countries. As a society, we have become very dependent on computers and when the systems go down we cannot function as well, businesses cannot conduct their business. With the internet connecting the world together, it gives concerns for cyber-terrorism and cyber-attacks. Cyberterrorism is when a group attacks a target with intention of causing harm and further political, social, religious, or other goals. Cyber-attacks are attacks on a target system carried about by different people and may not be associated with a terrorist group. They may be trying to steal information or corrupt data. There are many ways to carry out cyber-attacks such as malware, botnets, viruses, denial of service (DoS) accounts and many other types of attacks. Cybersecurity is also known as information security which applies to devices such as computers, laptops, mobile devices, networks, and including the internet to include preventing unauthorized access, modify, or destroying data. Department of Homeland Security plays roles in securing the federal government and helping to secure a cyber-ecosystem by helping with investigations and arrest of cyber criminals, releasing cyber alerts about threats, and educate the public and stay safe online. Cybersecurity includes evaluating networks and systems, information policies for organization, incident response team,
How do you feel about about adding more border security? Border security is a way of having more protection so people don 't come into a country where they are not from without having thier document or having permission to come into another country. I say there is no need of that because no matter how much security they have people are going to come into the country that they don 't belong in and also because there they are full of ideas to come in the country.
CYBER CRIME Cybercrime is one of the fastest growing type of crime in our society today and have also been a serious problem since it causes a lot of damages and also affect us in different ways. But before I go further let me start by telling you the meaning of cybercrime, Cybercrime is different and more heinous than normal crime that we know. This crime is committed in an electronic medium and here means read is not a requirement and is done in secret Feldman(2013). Cyber war takes place largely in secret, unknown to the general public of crimes include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war, illegal monitoring. Secondly let me talk about the effect of cybercrime in our society today.
Cyber threats continue to plague governments and businesses around the world. Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems. Normally there are two purposes of Cyberwarfare, espionage or sabotage. Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems. Cyber operations can also aide military operations, such as intelligence gathering and information warfare.
With widespread use of internet services, the network scale is expanding on daily basis and as the network scale increases so will the scale of security threats which can be applied to system connected to the network. Viruses and Intrusions are amongst most common threats that affects computer systems. Virus attacks can be controlled by proper antivirus installation and by keeping the antivirus up to date. Whereas any unauthorized access in the computer system by an intruder can be termed as Intrusion and controlled by IDS. Intruders can be grouped into two major categories which are external and internal Intruders.
National Security and Violations of Civil Liberties National security has been a hot button topic issue for over a decade. After 9/11 President bush rolled out the Homeland Security Act and the USA PATRIOT Act. Part of the USA PATRIOT Act includes allowances for the NSA to surveil and collect data on American citizens. This issue gained notoriety and national attention when Edward Snowden came forward with information about how the NSA was collecting information from Verizon everyday on phone numbers in the U.S. and out.
To begin with, Counterterrorism measures such as Biometric data collection would not flag Adam Smith as a homegrown terrorist. Even though Homeland Security’s advanced data collection and evaluation methods from have had outstanding triumphs with many foreign terrorists entering the United States. In the same fashion, administered programs such techniques are probable to yield false positives due to temporary or permanently distorted physical injuries. Furthermore, the homegrown terrorist in the U.S. is typically obedient to the laws with authentic proofs of identification with transgressions or not has not been alerted by Homeland Security as a terrorist.
People from different sections of the universe are interacting, collaborating, socializing and doing other different activities via internet, which in turn exposes their personal information in cyberspace. Lack of knowledge and cyber security awareness makes these people to be vulnerable to hackers and other malicious players who use the cyber environment. These has been supported by Furnell, Bryan, Phippton, (2007) when they argued that personal or individual internet users are highly exposed to security threats while using their own home computers. It is therefore important that internet users should have clear understanding of all the risks of using internet, the importance of protecting their personal information and the outcome if this is not done
NSA Surveillance "I can 't in good conscience allow the U.S. government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they 're secretly building" (Edward Snowden). The NSA began monitoring and collecting sensitive and personal information from Americans such as their emails, phone calls, photos and other private material. Massive surveillance began in 2001 after the terrorist attack in New York and since then there has been a big peak in government watching. It 's unnecessary for the NSA to monitor American’s private conversations as well as other sensitive data because people should be able to have a sense of privacy in personal communication with others. Government watching is something that the government shouldn’t do because although there are bad people in this world it is irrelevant for them to watch everyone because not everyone is bad and many people disfavors this decision.
Imagine for a second that every phone call you make, every text message you send, and every place you go is being constantly monitored by multiple governments. Well this is basically what the United State and United Kingdom's government is doing on a daily basis. The United States National Security Agency has been implementing projects in secret to monitoring people since 2001 but it would still be kept as a secret if Edward Snowden did not reveal this massive secret that was intruding the public’s privacy for years.
Computing in the Cloud The ‘Cloud’ allows for computer users to all avail of a single set of large-scale servers at the one time. This model provides for economies of scale in the global digital age. Digital services draw on the power behind multiple server computers. A variety of virtual items: Servers, computer applications, storage of information, services and networks and so on, are availed of in the ‘Cloud’ to permit access on a 24-hour basis.
After the 9/11 attacks on the US, the NSA, or “National Security Agency”, began doing surveillance on the country in order to find terrorists and stop them. The NSA, or National Security Agency, is an American intelligence agency specifically designed for national security. According to their website, “The majority of our nation’s intelligence for counterterrorism, hard targets, and support to military operations comes from the NSA.” However, US citizens are complaining that the NSA’s method for “securing our nation” is “unethical” and “unconstitutional”. They feel like they’re being “violated” and that their “right to privacy” is being overruled. To any uneducated individual, that individual’s right to privacy is as important as his/her right
In conclusion, NSA’s digital surveillance shouldn’t be continued for following reasons. First, it’s against of laws and constitution. Retrieving information from digital space is considered as unreasonable searches, therefore it violates the Fourth Amendment of the Constitution, which protects all U.S citizens from unreasonable searches. It’s not legal either.
Cybersecurity has become a growing cause for concern in the United States and indeed countries around the world. On February 9, 2016 President Barack Obama announced his Cybersecurity National Action plan (CNAP) to further the nations efforts to protect government agencies, citizens, and businesses from cyber threats domestic and abroad. However, cybersecurity is not a new issue in fact it is as old as the internet itself. With that said, I keep thinking back to that warm September day stained with the image of an enormous fireball engulfing our small TV set. This horrific day changed the course of history forever along with my future career path.
"While the Internet-based economy provides many benefits, it also raises new concerns for maintaining the privacy of information. â€œInternet privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences.â€