Preview

Disec

Powerful Essays
Open Document
Open Document
1366 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Disec
The First Committee of the General Assembly: Disarmament and International Security A Letter From the Chair: Hello, and welcome to the third Waubonsie Model UN conference. My name is Dawn Cronin, and I will be your chair for DISEC this year. This is my third year of Model UN, and my first time chairing a committee. Along with world affairs, I am also involved in youth and government, marching band, soccer and Irish dance. It will be expected of you to write a position paper regarding your country’s view. This should include information that you have researched, as this background guide is just a starting point for you. I look forward to spending a day full of debating with you all!

History of the Committee The Disarmament and International Security council’s primary goal is maintaining and promoting peace between nations. DISEC’s focus is to try to resolve international security problems, and disarm and prevent aggressive acts. The powers of DISEC are limited to what is stated in the UN charter in Chapter V. There are 192 member states, and a few observer groups. DISEC cannot declare war, or force any group or country to act on a resolution. Despite this, DISEC plays an important role in maintaining peace between countries, as it represents a unified view on a certain point. In the past, DISEC has been the debating ground for important issues dealing with the Cold War, and nuclear disarmament. It is the goal that we will form a resolution on our topics, with an agreement between the member states. This resolution may be presented to the Security Council, who will take action need be. Topic Area A Cyber Warfare Statement of the problem As the digital age progresses and computers become more prominent, the issue of cyber security comes into question. Governments have taken measures to make guidelines and laws regarding computer hacking within their own countries, but what can they do about issues dealing

You May Also Find These Documents Helpful

  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Basing itself on the fact that one of the fundamental purposes of the United Nations is to maintain international peace and security and to take effective collective measures for the prevention and removal of threats to the peace, and for the suppression of acts of aggression or other breaches of the peace.( See attachment 1).…

    • 2746 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Human factors can influence policy choices for both domestic and international cybersecurity issues. What will be discussed in this paper is how human factors can affect four selected cybersecurity issues. The four-cybersecurity issues selected are zero-day exploits, meta-data collected and used by private and public sectors, vulnerability assessments for mobile devices in the BYOD environment, and threats to copy right and ownership of intellectual property. This paper will go into details on important security issues, recommended policy controls, and how or why human factors can influence each of the recommended policy controls for each of the four selected topics mentioned.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Globalization has not only had an effect of physical crime, but also a substantial impact on cybercrimes. As we have become ever more reliant on computer based technology in our lives, computer hackers are continuously given new…

    • 1202 Words
    • 5 Pages
    Good Essays
  • Best Essays

    There is an exigent need for creative ideas leading to the next generation of cyber security capability. Existing approaches are simply not able to meet the demands of a global society growing in cyberspace on the current path. New business models are forcing greater interdependency between people, organisations and nation states in order to successfully manage cyber risk. Success will necessarily require an ability to anticipate, deter, detect, resist and tolerate attacks, understand and predict cyber risks, and respond and recover effectively at all levels, whether individual, enterprise, national or across international markets. In order to meet the demands of the future we will require new understanding, governance, regulation, partnerships, skills, and tools.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Better Essays

    [ 3 ]. William Jefferson Clinton "Remarks by the President Clinton, President Bush, President Carter, and Vice President Gore in signing of NAFTA Side Agreements” (speech, United States, White House, September 14, 1993).…

    • 2045 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    8. Deudney, Daniel & Meiser, Jeffrey. “American Exceptionalism”. Chapter 2. U.S. Foreign Policy. 2008. Pg. 39.…

    • 2328 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Ap Human Geography Final

    • 614 Words
    • 3 Pages

    "Global Issues at the United Nations." UN News Center. UN, n.d. Web. 27 May 2013.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Best Essays

    1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    peace and security, with responsibility being placed in the hands of the Security Council. The UN has been…

    • 1701 Words
    • 1 Page
    Better Essays
  • Good Essays

    The Un Global Compact

    • 599 Words
    • 3 Pages

    The United Nations Global Compact may be criticized on various determined basis but, like a good innocent baby, the internal goodness and vitality can not be succumbed. The idea at hand…

    • 599 Words
    • 3 Pages
    Good Essays