Cyber Security threats What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority. President Obama has realized the seriousness of the upcoming threats and turned the government focus more toward defending the information and communications infrastructure and In May 2009, he issued a request from top to bottom review of the current situation.
Global companies are faced with evolving beliefs and ethical reasoning to safeguard multiculturalism and employees are challenged with adapting such to change resulting in opposing ethical dogmas. Issues in diversification and perceived unfairness have gained unwanted attention not only with employees but lawmakers. Laws have been put into place to warrant impartiality with its current employee and future employees. Title VII Act, The Civil Rights Act of 1964 was enacted to protect the m... ... middle of paper ... ...e others may see it as unethical. Intolerable behavior by companies, despite abiding by the laws, has an alternate solution and leaving the company may be the best answer.
The actions provided in the article went against both the ACM and IEEE codes of ethics. Also the issues of privacy and intellectual property were clearly a damage for many businesses. New technologies should be developed to help prevent cyber-hacking. A better cyber-security should be set in businesses worldwide. This will benefit both the users and the owners.
(online Privacy) By now, you have probably heard a lot of debate over the USA Patriot Act, the federal legislation passed to give investigators more tools for apprehending terrorists. Proponents of the law say we need it to protect ourselves. Opponents say it threatens our constitutional rights. Nevertheless, whatever position you take on these issues, it is important to know how the new law will affect your life online. The Patriot Act is complex and powerful.
Security breaches come within a place where an individual has higher security clearance than others. It is extremely unfortunate that trust can be a problem having the wrong individual at the helm of important material. This type of person can be very difficult to prevent due to the employees easy user access of the computers and access to private information. Most importantly businesses must be aware these crimes occurring and always be mindful with giving employees the access to important persona... ... middle of paper ... ... the damage of these crimes is just as threatening. The economy and people’s lives are being destroyed by online hacking, but determination and prevention is the first step to containing if the problem may arise.
Moreover, the role of the federal government is vital to the nurture and efficacy of these and other emerging cybersecurity technologies. Certain policies need to be established and implemented, with backing and support from government in order to effectively counter cyber attacks at the enterprise, national, and international levels. 2. Emerging Cybersecurity Technologies Many current cyber defenses are dated and static, and subsequently cannot effectively respond to the growing number of dynamic threats (University of Maryland University College [UMUC], 2012). Thus, new technologies need to be developed that can dynamically assess networks in real-time.
Different authors have reviewed the cyber terrorism from different angles. Most of them have focused on the aims and objectives which terrorist wants to accomplish through cyber warfare. Moreover they have stressed over the need to the measures taken to combat cyber-attacks by terrorists. It is asserted in an article the battlefield of cyber space: the inevitable new military branch-the cyber force by Natasha Solce. In this article she has analyzed cyberspace as future battlefield she stressed on the need of plans which include amendments in constitution, establishing a cyber-force and strictked security measures to tackle cyber terrorism.
Others argue that the current circumstance is a reflection of government’s hopeless attempts to conceive an alternative solution for the aftermath of a lax regulation and inefficient policymaking. Overall, various research has shown an occurrence that the task before us is not easy while they are up against all odds. But before we start to take a look into the recent issues of cyber privacy, we must answer the questions in regards of how should we analysis the cyber securitization via critical security aspects? Traditional Security studies argues that the national security is essential to all citizens, because that in a anarchy and competitive arm force battle, only when the country is secured, the people will therefore be secured in the same manner. In other words, if the country is not secure, the government does not guarantee the individual’s security.
Digital privacy concerns, which have been a major issue in our country since 2001, increasingly violate our basic human rights as global citizens. The growing amount of government surveillance has manifested in the enactment of acts such as SOPA and CISPA. Although their intent on stopping digital piracy and attacks were clear, both were immediately met with harsh criticism; they allowed big corporations to violate our privacy rights by sharing our personal information with both other companies and the government. Our President, although publicly expressing his acknowledgement of the issue, failed to discuss an array of other pressing dilemmas regulated by the recently exposed National Security Agency (NSA), especially those involving the mass data stockpiles and the rights of foreigners against immoderate and disproportionate surveillance by the US. Furthermore, the intentions of the NSA still remain unclear; why is the collection and the extended retention of this data useful?
Fair employment practices are typically more complex than federal laws, meaning that in order to comply with laws regarding employment; companies must understand how to comply with a combination of federal and local laws. To help ensure that companies follow each and every one of these very complex laws, creating an affirmative action policy is a great way to make sure that all laws are followed. Affirmative action requires that employees analyze the workforce and development of their company to implement a plan to correct areas of past discrim... ... middle of paper ... ...aws, or it can possible end up causing several problems for the company. Diversity in the workplace is much more common than in the past, so the company can benefit greatly by showing employees and the public that the company is making every effort possible to ensure the best interest of everyone. A successful policy can be implemented if it is well thought out, complies with laws, and ensures that everyone within the company is treated fairly.