Preview

Cybersecurity Resolution

Powerful Essays
Open Document
Open Document
3606 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybersecurity Resolution
INTERNATIONAL
MODEL UNITED NATIONS CONFERENCE (2013)
GENERAL ASSEMBLY MAIN SUBMITTER: The Kingdom Of Denmark
CO-SUBMITTERS: The State of Japan,
SIGNATORIES: The Kingdom of Saudi Arabia, The French Republic, The Republic of the Philippines, Democratic Republic of Algeria, The Russian Federation, The Republic of Croatia, The Republic of India, The Republic of Tunisia, United States of America, The Islamic Republic of Afghanistan, The Argentine Republic, The Commonwealth of Australia, The Republic of Azerbajian, The Kingdom of Bahrain, The People’s Republic of Bangladesh, The Kingdom of Belgium, The Federated Republic of Brazil, The Kingdom of Cambodia, Canada, The Republic of Chile, The Republic of Colombia, The Republic of Croatia, The Republic of Cuba, The Czech Republic, The Democratic People’s Republic of Korea, The Democratic Republic of Congo, The Arab Republic of Egypt, Georgia, The Federal Republic of Germany, The Republic of Ghana, The Republic of Guatemala, The Republic of Indonesia, The Islamic Republic of Iran, The Republic of Iraq, The Republic of Ireland, The State of Israel, The Italian Republic, Jamaica, The Republic of Kenya, The State of Kuwait, Laos, Libya, Luxembourg, Malaysia, Mauritius, Mexico, Morocco, Namibia, Netherlands, New Zealand, Nigeria, Norway, Pakistan, Paraguay, Peru, Poland, Portugal, Qatar, Republic of Korea, Rwanda, Serbia, Spain, Sri Lanka, Sudan, Sweden, Switzerland, Syria, Thailand, Togo, Turkey, Uganda, Ukraine, UAE, UK, US, Venezuela

TBC

Resolution by the General Assembly
Bearing In Mind previous United Nations resolutions on the issue, such as, but not limited to, A/RES/55/63, A/RES/56/121, A/RES/57/239, A/RES/58/199, A/RES/64/211, and the methods and means in which they deal with the issue, and the obligations placed on member nations,

Deeply concerned that the prevalence of the use of the Internet for terrorist purposes is a rapidly growing phenomenon that will pose as a threat to many other

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a resolution of the member governments of the Organization of Economic Cooperation and Development (OECD)…

    • 640 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    i. Contemporary terrorist organizations are harmonizing their activities with scientific and technological discoveries, and in particular with the Internet and communication technologies. Collectively, this phenomenon is known as mega-terrorism.…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Davidson, J. W., Brian, D., Heyrman, C. L., Lytle, M. H., Stoff, M. B. (2008). Nation of nations:…

    • 4532 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    In “Terror on Facebook, Twitter and YouTube” Gabriel Weimann argues that social media has greatly aided the spread of terrorism over the advancement of technology in online communication. Weimann examines the use of interactive online communication by terrorists and their supporter- from chatrooms to social media and online video communities.…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Davidson, J.W, DeLay, B. Heyrman, C.L., Lytle, M.H., Stoff, M.B.( 2008) Nations of Nations: A…

    • 2748 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    There are numerous challenges emerging in homeland security. In my opinion, one of the biggest challenges is how the Internet is used. The Internet is being used by terrorist groups worldwide to spread their propaganda. These groups are using ungoverned Internet space to disseminate training material and poisonous propaganda to attract and lure individuals from around the world to their cause. They encourage these individuals to commit acts of violence in their own communities. These terror groups have used the Internet to provide these individuals vital training and information in the privacy of their own residence. With the Internet, these individuals no longer must travel out of country to obtain the training.…

    • 334 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Today the internet has completely changed the way people communicate with each other. It has changed the people conduct commerce, changed the way people research topics, the way people entertain and the way people break the law (Schmalleger, 2011, p. 70). Many of the crimes that are committed on the internet include: prostitution, drug sales, theft, fraud, conspiracy, bullying, and harassment. As the internet becoming more and more of a dominator factor in how society is driven so has these crimes. Kids are being bullied and harassed by their peers to the point that they are committing suicide. Stopping these acts are hard because it’s very difficult tracking everyone in America’s computer and it’s illegal without the correct warrant and process to monitor someone’s actions. The more that the internet becomes an everyday use for everyday America the more is going to be taken advantage of and break the law. I can see this being beneficial or detrimental to society as a whole. It can be beneficial by connecting the world but also detrimental by someone corrupting and hacking into the world. It’s going to be on the government and us to see how this outcome turns…

    • 1059 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Terrorism is one of the most remembered and feared occurrences in the world. Terrorism changes the lives and hearts of everyone that it affects. This paper explores the different types of terrorism, who commits the acts, how it affects the surrounding world, and what can be done to prevent it. This review of the different types of terrorism focuses primarily on the specific types of terrorism. This paper then tries to relay to the reader the understanding of all types, and the differences between them.…

    • 1251 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    ECOSOC 2014

    • 587 Words
    • 2 Pages

    The next resolution was submitted by the delegates of the Bahamas , Gambia , Guyana , Iran , Vanuatu and Myanmar together which…

    • 587 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Empower Girl Child

    • 3507 Words
    • 15 Pages

    * The views expressed in this paper are those of the author and do not necessarily represent those of the United Nations…

    • 3507 Words
    • 15 Pages
    Powerful Essays