Preview

Technology and the Impact on Cybersecurity

Powerful Essays
Open Document
Open Document
2781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Technology and the Impact on Cybersecurity
Technology and the Impact of Cyber Security Cyber security is one of the most significant issues facing world leaders today. Besides, threats from cyber attacks pose serious challenges to global network. In fact, most governments recognize the need to implement cyber security in Information and Communications Technology (ICT) systems. Cyber security is important because it ensures security of information. ICT systems encompass various aspects of the government. For instance, ICT systems cover national security, well being and economy of the government. Essentially, cyber security ensures that reliable information is relayed to the right systems. Notably, Australian authorities are increasing awareness on cyber crimes. Additionally, governments across the world are increasing awareness on cyber attacks. Particularly, governments try to mitigate on cyber crimes by upgrading their defense systems. These actions are aimed at achieving safe and reliable ICT systems. However, governments also face obstacles in their efforts to achieve resilient ICT systems. This paper will provide a literature review on technology and the impact of cyber crime (Australian Government, 2009). Cyber security is a term coined by computer scientists. It refers to security of computer systems. Cyber security involves protection of information, which is transmitted through the computer. The term cyber security was coined in the 1990s. Computer scientists were keen to outline challenges of networking computers. Cyber security presents numerous threats to computer systems. These included threat to organizations as well as threats to individuals. Cyber criminals may target any or both organizations and individuals. Cyber security tries to minimize attack on computer systems. Additionally, it tries to assure organizations and individuals of the safety and privacy of their data. Cyber criminals targeting national issues tend to attack government systems. Consequently, each government


References: Australian Government (2009). Cyber Security Strategy: An Overview. Retrieved from http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/Cyber%20Security%20-%20An%20Overview%20 (Brochure-Booklet).pdf Bamrara, A., Singh, G., & Bhatt, M Boateng, R., Olumide, L., Isabalija, R., & Budu J. (2011). Sakawa - Cybercrime and Criminality in Ghana. Journal of Information Technology Impact, 11(2), 85-100. Daryabar, F., Dehghantanha, A., Udzir, I., Sani, N., Shamsuddin, S., & Norouzizadeh, F. (2013). A Survey about Impacts of Cloud Computing on Digital Forensics. International Journal of Cyber-Security and Digital Forensics, 2(2), 77-94. Georgia Tech. (2012). Emerging Cyber Security Threats Report 2013. Retrieved from http://www.gtcybersecuritysummit.com/pdf/2013ThreatsReport.pdf Grauman, B Hansen, L. & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175. Kleiner, A., Nicholas, P., & Sullivan, K. (2013). Linking Cybersecurity Policy and Performance. Retrieved from http://www.gwumc.edu Leukfeldt, R., Veenstra, S., & Stol, W Ponemon Institute (2012). The Impact of Cybercrime on Business: Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil. Retrieved from http://www.ponemon.org Sommer, P., & Brown, I Suffolk, J. (2012). Cyber Security Perspectives: 21st Century Technology and Security – a Difficult Marriage. Retrieved from http://www.huawei.com

You May Also Find These Documents Helpful

  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    CSIA Renews Call for Congressional Action on Cyber Security . (2007, September 6). Retrieved October 9, 2007, from https://www.csialliance.org…

    • 302 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    4. Kramer, F., Star, S., & Wentz, L. (2009). Cyberpower and national security. Potomac Books,Inc…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    Kelly A. Gable, Cyber-Apocalypse Now; securing the internet Against Cyberterrorism and using Universal Jurisdiction and a Deterrent, 43 Vand. J. Transnat’l L. 57 (2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The Internet has become a daily ritual for Americans. So many people rely on technology and computers to do their shopping, banking, and communications. Where most of this used to be done in face-to-face communications, the ability to do it online has become increasingly popular because of the ease of use, but it is also putting fear in people as to whether their personal information is protected or not, and if our information is protected what does that exactly mean and who has access to it and how? This paper will examine cyber terrorism and information warfare, what has happened in past years and what needs to be done to not only protect our country, but us as citizens.…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Best Essays

    research paper

    • 2972 Words
    • 9 Pages

    Plunkett, D. A. (2013, March 14). Are We Ready To Defend Cyberspace? Webinar. Maryland. http://www.umuc.edu/securitystudies/events.cfm…

    • 2972 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Many expects have voiced their concerns about cybersecurity. The growing rate, sophistication and impacts of attacks on information systems that have happen in the United States consensus have built a framework for cybersecurity. The Federal role in cybersecurity includes assisting in protecting the organizations systems that are nonfederal and federal. This Individual Assignment will discuss cybersecurity laws, The Sarbanes-Oxley Act. Cybersecurity regulations, legal concepts, the reasons and methods of government interventions, the impacts and effects cybersecurity has on national security, and how the federal and state regulations create positive and negative effects for national security.…

    • 628 Words
    • 3 Pages
    Good Essays