Preview

Formal Speech( Social Networks and Cyber Crime)

Good Essays
Open Document
Open Document
350 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Formal Speech( Social Networks and Cyber Crime)
S P E E C H #03
Thank you Chair, As we know in the today’s world networks and communication has become a new dimension of our society. Almost everyone in our world is aware of internet and social networking sites on it. Now a day’s any rupture in internet can collapse the world economies and administrations. A large part of our population is rather prone to cyber crimes; yes the lovable internet is also a place to exercise easy piracy, frauds, hacking and other criminal activities.
Cyber-threats are without doubt a new security challenge. Like most countries, Finland is increasingly dependent on a secure and functioning cyber-space and therefore increasingly vulnerable to unexpected and rapidly-emerging cyber-attacks. That is why we aim to become a global forerunner in cyber-security.
While this will be the first such national strategy of its kind, the overall approach builds on decades of co-operation and co-ordination in crisis preparation and management.
The guidelines for the new cyber-strategy were laid down in 2010 in the government’s broader Security Strategy for Society and the European Union’s Convention to counter cyber threats.
At the moment, however, responsibility for cyber-security remains scattered between many different organisations and stakeholders, reflecting their specialist areas of expertise. This has slowed the creation of common objectives, with key decision-makers acting in relative isolation. Procedures and responsibilities during a nation-wide cyber-crisis have also yet to be defined with sufficient clarity. One of the main tasks of the current process, therefore, is to assess the need for a new authority to co-ordinate the strategy at a political level, as well as organising responsibilities at the operational level.
Many of the risks of cyber-attacks are shared between the governments and the private sectors. And since most of the critical infrastructure is owned by the private sectors, the job of identifying and managing

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (“Critical Security Controls,” n.d.).…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Eo 13636 Summary

    • 334 Words
    • 2 Pages

    The EO 13636 despite its early criticisms has accomplished a lot over the past two years considering the monumental task it was designed to undertake. The criticism that mandated solutions will inevitably be too slow to effectively respond is still true, but as the EO gains ground with the cooperation of private industry by sharing information to help coordinate efforts to enhance cybersecurity and providing liability protection, it seems that a mass solution is taking shape. One can only imagine how long it will actually take and how well it will be able to be managed and regulated. But one also hopes that a serious attack to our infrastructure does not take place before we at least get something in place that is flexible and can be improved…

    • 334 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    Technology innovation and global competition are two essential aspects of modern business, as a result companies invest a great deal in these areas (LeClair, 2000). It is imperative for senior management, like Steinhafel and his senior managers, to identify the information important to their business and which information is most valuable so that they can develop an IT infrastructure to protect those assets and then educate, inform, and train employees in a way that fosters a culture in which security is a priority (Dutta, 2002). With planning, innovation, and training a company can face the ever changing threats of the cyber world with increased confidence and thereby gain the confidence and business of their customers (Dutta,…

    • 422 Words
    • 2 Pages
    Good Essays
  • Best Essays

    There is an exigent need for creative ideas leading to the next generation of cyber security capability. Existing approaches are simply not able to meet the demands of a global society growing in cyberspace on the current path. New business models are forcing greater interdependency between people, organisations and nation states in order to successfully manage cyber risk. Success will necessarily require an ability to anticipate, deter, detect, resist and tolerate attacks, understand and predict cyber risks, and respond and recover effectively at all levels, whether individual, enterprise, national or across international markets. In order to meet the demands of the future we will require new understanding, governance, regulation, partnerships, skills, and tools.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Better Essays

    In order to answer the research questions, the monograph will examine the Department of Homeland Security’s. The monograph will also explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. Also, the description of the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure will be explained. The monograph will further evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure, and suggestions on methods improving the protection of our critical infrastructure and justifications recommendation will also be elaborated on (University of Strayer Materials, May, 2013).…

    • 1279 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Arguments Against Kaplan

    • 940 Words
    • 4 Pages

    Robert Kaplan makes a compelling argument in his book, “The Coming Anarchy,” that global environmental and social factors such as resource depletion, overpopulation, crime, and tribalism are the most pressing national security issues in the 21st century. He cites numerous examples of crime, war, and destitution in failing states of West Africa as well as protracted conflicts in the Balkans, and Central Asia. However, the environmental and social factors described by Kaplan are not security threats, per se, rather the fertile ground from which security threats arise. Resource depletion, overpopulation, tribalism, or combinations thereof are not sufficient conditions for security threats. Kaplan himself makes perhaps the best argument for this in his description of the Turkish culture and the people of a shanty town called Golden Mountain. Despite having many unfavorable…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In Computer Forensics, they metation some ways to combating cyberterrorism. They are Presidential Policy Directive 21, ICS_CERT, Cybersecurity Act of 2012, and Executive Order 13636. Presidential Policy Directive 21 is “The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure.” This is mostly own and operated by the state and local governments, and private sectors. This is a share responsibility of public and private entities.…

    • 422 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Arab Leqgue Resolution

    • 334 Words
    • 2 Pages

    Assessing the current state of cyber-security and its implications for regional defense and economic interests…

    • 334 Words
    • 2 Pages
    Best Essays
  • Powerful Essays

    AI in cyber Defense

    • 2430 Words
    • 9 Pages

    Cyber security is a multidisciplinary field that is targeted on reduction of risks to the secrecy, affinity and integrity of data, information and resources in computer as well as in network systems. Modern systems have become much complex. Need for an intelligent, adaptive and multimodal solution raises here for which best suited approach is artificial…

    • 2430 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    Technology is everywhere, which is evident in the everyday products that we as a society use such as computers, cell phones, global positioning devices, and the Internet. As technology expands and grows, so does the reliance and dependence on these types of products. But reliance and dependence are not the only things that technology brings. Cyber attacks are a gradually increasing occurrence that is derived from technology; however, stopping these types of attacks before they occur is usually more difficult than can be expected, but is overall not impossible. The trick to averting such an attack lies in the programs and applications that one uses for defense that recognizes, detects and notifies the user that an attack is imminent. This can be something as simple as a malware and/or virus program to something more complex such as a firewall. The purpose of this paper is to discuss what constitutes a cyber attack, examine the steps involved in a cyber attack, and determine how to prevent them, which was discussed in the article by Tony M. Damico entitled Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack (2009) and other sources.…

    • 1652 Words
    • 6 Pages
    Best Essays