Preview

Current cybersecurity policy issues for the protection of the Internet infrastructure

Powerful Essays
Open Document
Open Document
1586 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Current cybersecurity policy issues for the protection of the Internet infrastructure
ABSTRACT

Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users. INTRODUCTION

From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic

You May Also Find These Documents Helpful

  • Satisfactory Essays

    * Tends to increase in countries experiencing rapid growth in broadband infrastructure and connectivity, , readily available malicious code kits are making it simple for attackers to mount attacks, the online underground economy and malicious activity are benefiting from the downturn in the global economy.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Internet has become a daily ritual for Americans. So many people rely on technology and computers to do their shopping, banking, and communications. Where most of this used to be done in face-to-face communications, the ability to do it online has become increasingly popular because of the ease of use, but it is also putting fear in people as to whether their personal information is protected or not, and if our information is protected what does that exactly mean and who has access to it and how? This paper will examine cyber terrorism and information warfare, what has happened in past years and what needs to be done to not only protect our country, but us as citizens.…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Best Essays

    During the past decade the technological advancements of the Internet has significantly changed the method of communications and access to information for millions of users worldwide. First developed as a secure communications mode for the military during the height of the cold war era, the Internet has become as commonplace for Americans as the telephone or automobile. Users, provided that they have the necessary computer hardware and browser application as well as a network connection to the Internet are able to access and exchange information at speeds measured in thousandths of a second. Each time a connection to the Internet is made, users risk compromising their privacy through many different channels, including Internet service providers,…

    • 3351 Words
    • 14 Pages
    Best Essays
  • Better Essays

    The internet is a constantly changing and evolving environment. From its earliest days in the late 60s, when the very first small networks were brought online, to today’s massive and long-reaching web of connection, change is one of the few things that can be reliably predicted. This change is not only fast, but also dangerous to those who don’t understand or fully appreciate its potential to damage them or society. As the internet evolves to do nearly everything but sustain life itself, security becomes paramount. Internet users need to be more aware of today’s increasing rate of cyber-attacks and should stop sharing their personal information, use more secure logins, and utilize encryption software to protect themselves from the cyber-crime.…

    • 1719 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    With a growing reliance on technology, it is important for companies to protect against cyber risks. Since 2011, there have been 144 cyber data breaches at 99 different publicly traded companies or their subsidiaries. These breaches come with great costs. According to Ponemon Institute’s 2014 Cost of Cyber Crime Study: United State, the average cost of cyber-crime has risen from $6.5 million in 2010 to $12.7 million in 2014. The study also found a positive correlation between the time it takes to contain a cyber-attack and the cost associated with containing the cyber-attack, meaning it is best for companies to be prepared in case of a breach.…

    • 3225 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Computer Crime

    • 2386 Words
    • 10 Pages

    Bibliography: (1) Bowen, Mace. “Computer Crime.” 9/14/99. http://www.guru.net/. Visited: 10/28/00. (2) Edgar, Stacey L. Morality and Machines: Perspectives on Computer Ethics. Sudbury: Jones and Bartlett Publishers, 1997. (3) Jenson, Barbara. Cyberstalking: Crime, Enforcement and Personal Responsibility in the On-line World. New York: Wiley Computer Publishing, 1996. (4) Parker, Donn B. Computer Security. CD-ROM. Encarta Encyclopedia 2000. Microsoft Corporation. 1993-1999. (5) Parker, Donn B. Fighting Computer Crime: A New Framework for Protecting Information. New York: Wiley Computer Publishing, 1998. (6) Tribe, Laurence H. The Constitution in Cyberspace. New York: Warren & Computer Professionals, 1991. (7) U.S. Dept of Justice. “Cyber Crime.” 5/23/00. http://www.cybercrime.gov/. Visited: 10/27/00.…

    • 2386 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Network Security Analysis

    • 5047 Words
    • 21 Pages

    With the rapid development of the Internet and the widespread application, the number of computer viruses, Trojan horses is explosive growth. According to Jinshan drug gangsters "cloud security" center monitoring statistics show that in 2008, Jinshan drug gangsters were intercepted more and more new viruses, Trojans, which grew up 40% compared with 2007. The center statistics also show that 90% of the virus infected users, this attachment web pages that humans are enjoying the network information with the great wealth and convenient at the same time, also be the severe beset by problems of network information security.…

    • 5047 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Access Control - 1

    • 450 Words
    • 2 Pages

    A virus is a computer program written for entering your computer without your permission. Some viruses just reproduce itself and spread through your system. However, some may cause damage or effect program or system performance. When this happens, it is referred to as your computer being infected. In today’s world of communication, with the internet, computers, cell phones, and having such easy access, viruses are a real threat to your computer system. Mark Ciampa, author of Security +, Guide to Network Security Fundamentals, wrote, “A biological virus is an agent hat reproduces itself”. (Page 43) He goes on to write, “A computer virus is a malicious computer code that, like its biological counterpart, reproduces itself on the same computer”. (Page 44) There are many different kinds of known computer viruses, and there are new ones being created every day. That is why computer and network security is so important. Some use these programs for scams or internet crime. This ranges from just breaking into computer system for fun, to stealing money, identity theft, company secrets, to child pornography. There is even a virus that is an email Trojan horse that could blow up your computer. Therefore, we need to be careful what emails we open and what we download to our computers. We need to be careful how we choose our also. There are people ready to get into your computer for any information they can retrieve. These bad people are called hackers, which Mark Ciampa describes in his Security + book on page20 of the first chapter. For example, South Carolina had a security breach that put 3.6 million taxpayers at risk for identity theft. The email entitled “CCIT advice on state security information breach” informed Clemson students on October 27th that personal…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer crimes such as malicious attacks on software, identity theft, and illegal distribution are quickly becoming big problems that are not easily enforceable. When average people hear the words "computer crime", they often think of obscene pictures available on the Internet or solicitation of children for sex by pedophiles via the Internet. The legal problem of obscenity on the Internet is the same as the legal problem of obscenity in books and magazines. It is not as pressing as other Internet crimes. There are no precise, reliable statistics on the amount of computer crime and the loss to victims. These silent crimes are not detected by victims and therefore are not reported to authorities. This in turn leads to a miscalculation about both the number of computer crimes committed and the damage. Nevertheless, there is a consensus among both law enforcement personnel and computer scientists who specialize in security that both the number of computer crime incidents and the sophistication of computer criminals is rapidly increasing. There are three major classes of criminal activity with computers: unauthorized use of a computer (stealing a username and password), creating or releasing a malicious computer program (computer virus, worm, Trojan Horse), and harassment and stalking in cyberspace.…

    • 485 Words
    • 2 Pages
    Good Essays
  • Good Essays

    student

    • 317 Words
    • 2 Pages

    New trends in cybercrime are emerging all the time, with costs to the global economy running to billions of dollars.…

    • 317 Words
    • 2 Pages
    Good Essays