Cyber security is quickly becoming a major factor in business management, government interaction, and personal privacy. Many people in the United States are constantly communicating over devices such as phones or computers, and the use of such devices will only continue to increase. With the abundant use of technology, the possibility of being attacked also increases. The more people using technology will create higher probability of attack. Although the media is just now catching on to cyber-attacks, the perpetrations occur more often than in the past. The trend of using cyberspace as a battlefield more than likely will become more pervasive and common. This trend also questions whether or not technology should have limitations or restrictions. I...
... middle of paper ...
...energy in order to complete.
In conclusion, Blakeslee makes a reasonable and compelling argument to use education to help fight and prevent cybercrime. Time is also another important factor to recognize. Due to rapid technological advances in the last thirty years, time maybe the only real remedy for cyber security. The Orthrus of technology is a beast that can be tamed. Heracles does not have to destroy the two-headed monster, and we do not need to completely destroy the use and access of the internet. However, great care in cyber security must be taken in order to provide safety and tranquility. Whether education or time, litigators and the average citizen must realize that work and energy must be put into fighting cybercrime.
Blakeslee, Melise R. Internet Crimes, Torts and Scams: Investigation and Remedies. Oxford: Oxford University Press, 2010.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Businesses and people are using Internet for entertainment, e-business and e-commerce, social networking, and communication to the people and business, but there have always been threats to the Internet Security. Internet security is major concern in field of technology, because there are various personal, business and government data on the Internet. Today every businesses and organizations have their own security systems to reach their goals of information security. Internet security systems are created to reduce cyber attack risks, reliability, maintain confidentiality, and compliance with privacy laws and national security laws.... [tags: Security, Computer security, Internet]
962 words (2.7 pages)
- Cyber security, also known as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. Most aspects of our lives rely on the Internet and computers, including communications (e-mail, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth or death records, social security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine (equipment, medical records), and education (virtual classrooms, online report cards, research).... [tags: Computer security, Information security, Computer]
1059 words (3 pages)
- ... The U.S. Department of Homeland Security (DHS) reported that the number of cyber attacks launched against U.S. infrastructure in 2012 increased by over 50 percent, and over 7,000 key industrial control systems are vulnerable to attack. Cybercriminals tend to focus where the weak spots are and use technique until it becomes less effective, and then move on to the next frontier. For this reason, the targets and the attacks techniques change every time. As example of some of the most attacks techniques utilized are socially engineered, unpatched software and Phishing attacks.... [tags: cyber attacks, hacking]
1282 words (3.7 pages)
- The cyber security of communications systems is the vulnerability of our communications to information welfare. Communications systems are a critical component of our national security and emergency preparedness resources. Information exchange through voice data, video, and internet connectivity are the major supporting factors and constitute an important part of the overall national critical infrastructure. There are many different jobs within this field that require a broad range of knowledge, skills and abilities.... [tags: Security, National security, Computer security]
1226 words (3.5 pages)
- Cyber security is like trying to box while being blindfolded.. Cyber instability may cause massive panic in citizens of the United States. Government surveillance is one of the platforms of cyber security and it started to erupt after the 9/11 incident. The main ways the government watches people today is with cell phone, social media, and email surveillance. Should they be able to invade our privacy. Maybe. Many crimes are committed on computers everyday whether it be credit card hacks, stolen identities, or even social media accounts taken.... [tags: E-mail, Mobile phone, Computer security, .hack]
1008 words (2.9 pages)
- Cyber Security as an International Security Threat National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face.... [tags: cyber terrorists, cyberspace]
2186 words (6.2 pages)
- Due to the growth and success of Advanced Research our systems have recently become a target for hacking and cyber-attacks. As an organization we know of several attempts to steal the intellectual property of Advanced Research and sell the stolen properties to direct competitors. Beyond that we are all aware of the 2011 issues involving Advanced Research’s public website, website defacement and Denial of Service (DoS) attacks are common tactics of attackers. Also in today’s cyber climate it is well known that any organization, no matter the size or prestige, with a cyber-presence is vulnerable to attacks and exploits.... [tags: metasploit pro, IT, hacking, cyber attacks]
1358 words (3.9 pages)
- Pursuit of knowledge has always been my obsession and the propelling force behind all my achievements. I intend to pursue a Ph.D. in cybersecurity and my career aspiration is to become a professor and a researcher. My research interests include Insider threats, Malware and Botnets, Network security, security of IoT, Cyber warfare, Identity and integrity, social Engineering, physical Infrastructure security, Industrial control system security, usable security, Cybercrime and the underground economy, cybersecurity Risk Management, international corporation on cybercrime and cyber terrorism, end-user security, Economics of information security, Privacy and freedom issues, Soc... [tags: Security, Computer security, Saudi Arabia]
765 words (2.2 pages)
- The importance of cyber security is at an all-time high. The United States Infrastructure is outdated to the point if a cyber-attack did happen to the nation’s power infrastructure, the nation will have trouble in fixing the damage infrastructure. Many nations and companies are spending millions to billions to restructure their systems to reduce the chance of being hacked. As more things are connect to the internet, the higher of chance of those things being control by individuals that want to cause damage to those systems.... [tags: Computer security, Security, Nuclear power]
775 words (2.2 pages)
- In Greek mythology, the Theogony recalls the lineage of Greek deities. Part of the story contains information about a monster named Orthrus. The beast is a two headed dog that was responsible for guarding the island. However, Orthrus was eventually slaughtered by the epic hero, Heracles. Obviously, a two headed, monster dog has potential to bring about catastrophe. But trained in the correct way, Orthrus could have been a valiant watchdog and become an honorable hero in Greek legend. Technology in the present is very much like Orthrus in that progress and advances can lead to a positive or negative impact on the world.... [tags: Internet, technology, cyberspace, abuse, Orthus]
1532 words (4.4 pages)