Cyberterrorism, is an explosive and heavily volatile act that threatens the very fabric of networking operations of their intended target/s, and guess what, the United States “cyberspace” platform has provided a means of accessing our most secretive, sensitive, including, military tactical operations data. Successful attacks upon the US networking infrastructure would obviously impede governmental operation, more importantly; accessing a wealth of potentially destructive information would have profound implications, thus, Cybersecurity policies must be implemented. Cybersecurity policies create levels and barriers of networking security as their standards, guidelines, and response to potential threats, vulnerabilities, and consequential risk are greatly reduced.
Encompassing the security of “Cyberspace” is an extensive range of threat prevention and reduction techniques designed to thwart attackers from accessing the networking infrastructure. Cyberspace by definition is a platform in which communication through technology occurs. Thwarted with dangers that pose extreme risk, Cyberspace has become the premier criminal activity platform due to its perpetual anonymity resulting in the harm to another entities technology, commuters/servers, as well as storage databases. This policy proposal shall minimize vulnerability, increase prevention and deterrence while providing incident response standards and practices including perpetrator accountability (House, 2014).
Section I: Description of Policy
This “Cybersecurity” Policy sets forth the written rule and regulation of the .gov domain networking infrastructure conduct, network security disciplines, as well as type of threats, risks, and vulnerabilities in which investiga...
... middle of paper ...
...esident Barack Obama: http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
NIST. (2014, March 5th). Cybersecurity Framework. Retrieved from National Institute of Standards and Technology: http://www.nist.gov/cyberframework/index.cfm
NIST. (2014). Framework for Improving Critical Infrastructure Cybersecurity. Gaithersburg, MD : National Institute of Standards and Technology.
Tehan, R. (2014, March 5th). Cybersecurity: Authoritative Reports and Resources, by Topic: Cybercrime, Data Breaches, and Data Security. Retrieved from Congressional Research Service: http://www.fas.org/sgp/crs/misc/R42507.pdf
Titch, S. (2014, March 6th). U.S. Cybersecurity Policy:Problems and Principles: Government’s Role Still Needs Definition. Retrieved from The Heartland Institute: https://heartland.org/sites/default/files/08-01-13_titch_policy_brief_cybersecurity.pdf
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Different Methods of Cybercrime and Their Effects on Modern Society The world we live in is more technologically advanced than ever before, with newer developments coming every year. Men, women, and children worldwide rely on the Internet for work, school, play, socialization, and any number of other reasons. Yet, despite the great advantages technology gives to us, with our increased reliance and connectivity comes an increased risk of crime, namely cybercrime (Department of Homeland Security, 2013).... [tags: Internet Crime, Cyber Crime Essays]
930 words (2.7 pages)
- What is Cyber Security. Cyber Security can be defined as “measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack”. (Bullock 283). In other words, an attempt by individuals to protect their personal information and other digital resources from attacks from the cyber world. Why is Cyber Security important. Cyber security was created because of the sensitive information that is frequently stored on computers that are attached to the Internet.... [tags: hacking, cybercrime, access to information online]
939 words (2.7 pages)
- Susan W. Brenner’s Cybercrime: Criminal Threats from Cyberspace is scary, exciting, and informative all in one book. It takes you on rollercoaster from start to finish as your eyes are opened to the realities of cybercrime and cybercriminals’ capabilities as our technologies have progressed. Brenner’s book is an excellent piece for those that are not savvy about technology terminology and cybercrime. Brenner opens by giving an example of the chaos that a cybercriminal can make and the long distance at which this can occur.... [tags: Internet Crime, Cyber Crime Essays]
2518 words (7.2 pages)
- It is difficult to define cyberculture because its boundaries are uncertain and applications to certain circumstances can often be disputed. The common threads of defining cyberculture is a culture which has evolved and continues to evolve from the use of computer networks and the internet and is guided by social and cultural movements reflective of advancements in scientific and technological information. It is not a unified culture but rather a culture that exists in cyberspace and is a compilation of numerous new technologies and capabilities, used by diverse people in diverse real – world locations.... [tags: Technology, National Defense]
2034 words (5.8 pages)
- Freedom of Speech in Cyberspace Since the public has logged onto the internet there has been vast amounts of information available. Since the 1990s more and more countries have entered into the information age. Due to the lack of freedom of speech in several countries, censorship has now taken on a prevalent role in the suppression of information. Many countries view a great deal of information as a threat if put into the wrong hands and as a consequence attempt to reduce its availability. However, unlike many of its other counterparts, the United States takes a very liberal stance towards the access if information on the Internet, which is protected by the First Amendament.... [tags: Internet Web Cyberspace Essays]
2177 words (6.2 pages)
- In my opinion cyberspace and the internet aren't as different as they are complementary. After all, it was said in class that, "the internet is a computer net work and cyberspace is that network visualized as a virtual space." Using these definitions it would seem that they work together to create a whole, a system, we use to create an "interface" to information. So, taking this into consideration I will discuss the parallels between both the internet and cyberspace and I will discuss what they lack when separated from one another.... [tags: Internet Cyberspace Web Net]
1606 words (4.6 pages)
- Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal.... [tags: Internet Crime, Cyber Crime Essays]
2979 words (8.5 pages)
- The internet has become a virtual reality for people to do as they please. This has aided to the increase in internet crime. Although, it is becoming a bigger and bigger part of crime, cybercrime will not be the only form of crime; it is not feasible for crime to just exist on the internet. In some ways internet crimes are worse than physical crimes because the internet is like a virtual reality for the online predators. They can be whoever they want to be. Also it is not very difficult for an experienced hacker to steal the identity of another person.... [tags: Internet Crime, Cyber Crime Essays]
685 words (2 pages)
- Millions of people around the world use computers and the internet everyday. We all use it in school, work even at home, computers have made us life easier, it has brought so many benefits to society but it has also brought some problems, cybercrimes is one of them. The internet could be considered a type of community of computer networks, therefore we could consider it a society. Like in every society, in the internet there is commerce, education, entertainment, and of course there is crime, cybercrime.... [tags: Internet Crime, Cyber Crime Essays]
1748 words (5 pages)
- Cyberspace Computers and Cyberspace When does reality end and cyberspace begin. Can crimes committed in cyberspace be punished in reality. Can a “cyber relationship” have the same rules as a relationship in reality. Basically, is cyberspace part of regular life or is it a world created by us with ever changing and moving norms. Often, people make comment that they become so focused on something and it becomes a part of their life, an extension of them. I feel the same can be said of cyberspace.... [tags: essays papers]
487 words (1.4 pages)