Cyber Security Essay

2189 Words5 Pages

Cyberbullying and Cyber Security Risks in 2014

Home

Needless to say, advancing technologies have integrated themselves into more and more aspects of our lives over time. These days, there are little services (including many fundamental services) that don't rely on the internet. Whether it be for e-mail, entertainment, education, or banking purposes, amongst many other available services, we rely on the internet on a daily basis. With rapid developments in the social networking phenomenon, people are online more often than ever before; some may even call it an addiction. Paired with rapid developments in technological convergence, such as that seen in smart phones and even flat screen televisions nowadays, we have access to a wide array of internet-based services everywhere we go. It is clear that, with more of our physical activities being replaced with online activities, the fine line between real life and online life will soon be non-existent. Not to mention, the availability and accessibility to such technologies has also greatly expanded in recent times, with a wide variety of demographics entering and staying within the "cyberspace". This movement to the cyberspace has given rise to many cyber- counterpart terms such as cyberbullying and cybersecurity, all under the realm of cyberethics. This website will discuss the many implications of living in the cyberspace. Furthermore, after a brief introduction to the topic of cyberbullying and cybersecurity risks, a deeper analysis will be conducted through the following lenses: (1) history, (2) architecture & geography, (3) governance & placing barriers, (4) freedom of speech, (5) intellectual property, and (6) privacy. Finally, the website will feature a conclusion & fin...

... middle of paper ...

...ng the companies brand image, individuals are tricked into providing sensitive information such as passwords, financial information, etc. This is a clear use of intellectual property being used in theft schemes for financial gain. Hacking is another common cybersecurity threat in which unauthorized access is gained into an individual's/company's computer system. When hackers enter company databases, they can gain a lot of information about the company, its trade secrets, its customers, etc. While many individuals may be affected by a breach, cutthroat competition (and thus hacking) usually starts at the corporate entity level. Corporations can be ruthless, using more common techniques such as espionage to gain the upper hand. Recently, the U.S. has had a major issue with Chinese hackers who were stealing a lot of American intellectual property.

Privacy

Conclusion

More about Cyber Security Essay

Open Document