StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

National Security on the Internet - Assignment Example

Cite this document
Summary
The paper "National Security on the Internet" discusses that the Internet is a global network that allows millions of devices to access each other and convey information and communication services. Today, the Internet is an architecture that supports triple play applications such as voice, video…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful

Extract of sample "National Security on the Internet"

Abstract

The Internet is a global network that allows millions of devices to access each other and convey information and communication services. Today, the Internet is an architecture that supports triple play applications such as voice, video, and data and even quadruple play with mobility and IPv6. A lot of different services are provided on the Internet, including VoIP and IPTV. Network (net) neutrality issue and its technical and regulatory contexts in the Internet environment have been argued in the last decade. Net neutrality means that Internet Service Providers (ISPs) should treat all contents, data packets, and applications identically regardless of source and offer equal treatment to all traffic. Net neutrality is of great significance in terms of Quality of Service (QoS), network management, investments and innovations, non-discrimination and competition, and security and privacy issues. As per the DHS statistical reports, the energy sector is substantially critical since it provides an "enabling duty" across entire significant infrastructure sectors. Besides, most of the private-owned companies (eighty percent) possess and regulate the energy sector leading to a greater to the government. Currently, the cyber insecurities have escalated tremendously as compared to the international physical warfare. The overreliance of the computerized technology by the energy infrastructure possesses a threat to the cyber attackers. US Department of Energy has the mandate to protect the energy infrastructure from cyber insecurities to reduce the risk uncertainties. No conflict exists between ethics, law, and politics.

Keywords: Internet, network (net) neutrality, open access, regulation.

Introduction

The cyber threat arises from the untrustworthy nature of several primary stakeholders embedded with the rapidly evolving scope of internet threats. The constitutional laws serve as the essential remedy for ensuring balance and checks for the changing technological developments. It is necessary to protect national welfare as well as preserving human dignity. Besides, both the public and private-owned companies should ensure they protect the Cyberspace from terrorists. Insecurities may arise in cases of sharing sane internet infrastructure. Nowadays, the international policymakers spearhead for internet security to discourage violent behaviors, such as cyberbullying and the escalation of cybercrimes. Despite the freedom allowed for ISPs to block harmful content, ISPs should not block legitimate technologies as per the internet security guidelines. Therefore, there lacks a clear guideline principle between cybersecurity and internet freedom. The proposed guidelines should allow cybersecurity without interfering with the national neutrality rule. The ISPs play a significant role in ensuring detecting security malfunctions, and due to their escalated economies of scale, they provide services in a cost-efficient way. They also detect hidden threats through network filtering. Despite that, it is essential to impose penalties on ISPs in case of security threats since most of them focus on economic inducements.

Of the documents reviewed in class (excluding the US Constitution), which do you feel serves as the most important at this point? Be sure to provide significant support for your argument.

The article " Security versus Freedom" on the Internet is essential since it examines the effects of the global Internet on human beings. It is the mandate of the global policymakers to safeguard civilians from internet threats, like cyber attacks and espionage. Such an insecure network has resulted from the internet freedom given to civilians under the network neutrality or open internet regulations. For example, the lack of internet control by Internet Service Providers (ISPs) from blocking some online technologies encourages intense security threats (O'Sullivan et al., 2015). Therefore, the regulations should assign the ISPs to control over the Internet to ensure cybersecurity. Nowadays, the international policymakers spearhead for internet security to discourage violent behaviors, such as cyberbullying and the escalation of cybercrimes. Despite the freedom allowed for ISPs to block harmful content, ISPs should not block legitimate technologies as per the internet security guidelines (Ammori et a.l, 2010). Therefore, there lacks a clear guideline principle between cybersecurity and internet freedom. The proposed guidelines should allow cybersecurity without interfering with the national neutrality rule.

The cyber threat arises from the untrustworthy nature of several primary stakeholders embedded with the rapidly evolving scope of internet threats. The constitutional laws serve as the essential remedy for ensuring balance and checks for the changing technological developments. It is necessary to protect national welfare and preserve human dignity (O'Sullivan et al., 2015). Besides, both the public and private-owned companies should ensure they protect the Cyberspace from terrorists. Insecurities may arise in cases of sharing sane internet infrastructure. The cyberattacks can be either in the form of espionage, attack, or fraud (Ammori et a.l, 2010). For example, the international students in China attacked Google Corporation data possing a threat to its operations. With the rapid escalation of terrorist attacks, like military demand communications, it is essential to ensure people's safety, primarily for both military and private-owned security firms to provide humanitarian protection (Newsome et al., 2015).

It is essential to adopt the cybersecurity policy for the ISPs to curb threats. Firstly, botnet consists of the integration of various client network systems, thus malware dissemination. Through cyber attacks, the criminal's souvenir restricts data, obtains web banking statistics, and implements them from organizational Command-and Control distributors. The IoT connection to electronic devices such as laptops makes cybercriminals to deploy botnets attacks. 'The botnets have contaminated approximately 2.5 million electronic devices globally.' (Pawar et al., 2016). The use of the botnets by attackers leads to the execution of the service denial to multiple IoT gadgets. The sophisticated botnets make it difficult for organizations to manage the attacks. Denial of Service (DoS) has led to storage system overload due to multiple notification requests. 'Cybercriminals use the strategy to minimize or undermine service operations for business reputation destruction rather than stealing their data' (Bakhshi et al., 2018). For example, an airline system attack makes its clients not process flight status, book or cancel a ticket, among others. Therefore, the customers shift to other alternative airlines affecting the revenue collection of the former. 'The attackers may use the man-in-the-middle (MiTM) strategy to alter the conversation channel system among people by message interception' (Bakhshi et al., 2018). Communication access makes cybercriminals leads to illegal distribution of messages to participating schemes. The approach leads to IoT attacks through data sharing in real-time. Besides, MiTM makes hackers interfere with the communication of various IoT gadgets, thus rapid system malfunction.

The data breach has increased over the years. The hackers have accessed millions of people's identity and data theft, such as credentials leading to data violations, (Chin et al., 2017). The cybercriminals have increased the IoT attacks, including smartwatches, among others, for acquiring additional business information. Therefore, attackers implement comprehensive identity thefts in companies. 'The invasion of endangered company sensors leads to network access' (Chin et al., 2017). The social engineering has made people share sensitive information with hackers. It leads to the malicious installation of software systems for IoT devices such as email phishing to manipulate people. The hackers can acquire personally identifiable information to obtain confidential information such as purchase history, among others (Newsome et al., 2015). Also, the companies should embrace the use of the holistic cybersecurity measures such as the execution of operators' VPNs to ensure database protection. 'The implementation of strategies, such as two-factor authentication, minimizes the acquisition of the information by the hackers, thus fewer security threats' (Ammori et a.l, 2010). Nowadays, the business should integrate modern biometrics in the Internet of Things gadgets to increase database security.

Through remote taping, the attackers expose database securities to the Internet ultimatums. 'The technology expertise agencies lack comprehensive comprehension of zero-day exploitation on the Internet by the cybercriminals' (Pawar et al., 2016). The public communication recording in the electronic gadgets leads to illegal acquisition of unauthorized information, thus privacy violation. Before the use of any IoT Infrastructure, the company managers need a universal cybersecurity policy. 'The lack of encryption of the shared data makes it easy for attackers to hack the company databases' (Bakhshi et al., 2018). The companies that lack comprehensive modern cyber securities, such as blockchain, expose secured information to cybercriminals (Khan et al., 2018). Besides, the ISPs play a significant role in ensuring detecting security malfunctions, and due to their escalated economies of scale, they provide services in a cost-efficient way. They also detect hidden threats through network filtering. Despite that, it is essential to impose penalties on ISPs in case of security threats since most of them focus on economic inducements. Therefore, even though the ISPs ensure cybersecurity, it is essential to observe the open Internet (Martin, 2019). They should not-discriminate users to access multiple websites to showcase freedom of expression through Twitter, Facebook, and other social media platforms. Censorship of media information impedes international development growth. The ISPs violating the cybersecurity guidelines should get fined and excluded from providing services. The ISPs facing challenges of distrust from the government security organs should share their drawbacks to develop mitigating measures of technology dynamic nature (Ammori et a.l, 2010). Having a designed operations system helps the divided authorities trust each other at executing internet security services.

When examining critical infrastructure, which sector possesses the biggest risk and what legal and ethical issues must the US government consider when attempting to harden the target?

In the tranquil and periods of war, the country's critical infrastructure remains the most considerate source of unease in the US. The United States has a total of sixteen infrastructure sectors wholly classified as vital and essential due to their nation's explanation for unity and cohesion (Richards, 2015). Among them, the energy sector serves as the backbone. As per the statistical reports, the energy sector is substantially critical since it provides an "enabling duty" across the entire significant infrastructure sectors (Tran et al., 2017). Besides, most of the private-owned companies (eighty percent) possess and regulate the energy sector leading to a greater to the government. Therefore, when the energy infrastructure experiences any form of attack, it can make it to instantaneously shut down the country's operations, leading to unfeasible daily chores among the citizens since most activities of daily living rely on the energy sector.

The most considerate legal objections in the energy sector become endangered by qualms and time necessitated to control or mitigate emerging uncertainties. In the energy sector, the primary stakeholders encounter legal policy modifications and regulatory dimensions, distortion of public opinion regarding renewable energy, the climatical policy changes, and the adjustment to policies and government representatives (Tran et al., 2017). With the escalation of energy demands, the obstacles continue to escalate. The rapid investments in the energy sector lead to the demand elevation resulting in modern infrastructure planning. The advocates in the energy sector face legal appeals and challenges while executing duties in the industry (Richards, 2015).

The energy sector encounters tremendous shifts. One of the essential facets experienced in the energy sector is risk management. Globally, the whole societal level expends energy. With the reliance on the modern era's technological operation, it is thus placing several considerable requests on the energy system (Carlson, 2017). Therefore, it is crucial to undertake rigorous speculation since the new system in the energy sector cannot withstand higher technology (Duangnate, 2015). In current society, it is difficult to operate in energy without integration with modern technology. The investors should develop and incorporate grid technologies for the betterment of the sporadic power sources. It is the mandate of the energy sector regulators to possess sprightly attributes and acquire the capability to distort and amalgamate the altered technology and power sources (Ammori et a.l, 2010).

In both the internal and external points of view, it is more uncomplicated to penetrate the US energy infrastructure as per the current energy system. Therefore, in the cases of hazardous incidents, it is essential to protect the energy sector. The primary stakeholders should focus on alternative energy sources in the country, like non-renewable for the country's stability restoration (Martin, 2019). In an honest perspective, energy sector separation results in additional costs and indubitable inefficiencies (Duangnate, 2015). However, it seems advantageous compared to the money required in situations of the national power grid failure. Currently, the cyber insecurities have escalated tremendously as compared to the international physical warfare. The overreliance of the computerized technology by the energy infrastructure possesses a threat to the cyber attackers (Logan, 2017). US Department of Energy has the mandate to protect the energy infrastructure from cyber insecurities to reduce the risk uncertainties.

Discuss the challenges associated with protecting the homeland and balancing privacy and civil liberties. Is there a conflict between law, ethics, and politics, and does this present challenges in homeland security?

Firstly, the most considerate obstacle is the nation's safeguarding protection with the preservation of people's life of doing daily activities. The most significant responsibilities if the Department of Homeland Security involves upholding public liberties and ensuring the safety of American's physical assets (Harrop et al., 2015). The US activists have spearheaded a vast conversation regarding the general liberties via war weaponized discrepancies. Besides, the general public has an awareness of pre-existing liberty warfare. In the modern world, disputes arise from the internet web and smartphone utilization compared to the Fourth Amendment regarding civil liberty (Carlson, 2017). Therefore, transcontinental schemes operate effectively due to the integration of modern communication devices and internet use in daily activities. Despite the advantages acquired from advanced technology, people spread extremist propaganda and beliefs retrieved from multiple websites. There is an increased number of people's vulnerability in the US due to the problem associated with cyber-attacks. One of the consummate standards is ensuring the freedom of the press. Besides, censorship in the freedom of expression for the media deters people from acquiring their liberty. The media sources have the independent power and privilege to spread viable information even regarding national security.

No conflict exists between ethics, law, and politics. Therefore, when balancing civil liberties and national security, both ethics, law, and politics integrate into one component. From the old days up-to-today, people continue to propel racial profiling passionate discussions (Logan, 2017). With the incorporation of the ethnicity in national security issues and law enforcement, such a move continues to plague homeland security always. The US Department of Justice in 2003 gave out, "Guidance Regarding the Use of Race by Federal Law Enforcement Agencies," involving direction guideline statements, rigid legal examination, and the particular law enforcement direction via fourteen hypothetical real sequences comprehensively comprehended by the field operators (Carlson, 2017).

The companies among other companies should uphold the American ethics of justice and civility by not discriminating against people according to their ethnicity. People discrimination by the recognized agencies threatens the entire law enforcement system, thus making people distrust the government's responsibilities in protecting them (Harrop et al., 2015). The escalation of racial profiling among the Americans results in the breach of the national Constitution. For example, in conjunction with the Court of Appeal in the case of Chavez versus Illinois State Police, the US supreme court made it clear that the use of banned racial categorizations in determining whom to detain, stop, and search extremely disputes the Equal Protection Clause. The current political climate in the spearheads measures curbs racial profiling to enable equality among all the Americans in employment, education, and other sectors (Akhgar et al., 2015).

Critique the homeland security enterprise's capability to meet emergent future challenges while balancing civil liberties.

The United States has voted as one of the most secure countries globally since its independence declaration through hosting multicultural groups with freedom of expression. Despite such privilege, there is an escalated fear of the security sacrifice of given residents civil liberties. Despite that, Homeland security has proven to uphold at balancing the national call for security measures and the preservation of the resident's civil freedom (Alperen, 2017). It takes an overwhelming analysis to assess the potential threats posed by the national insecurities to foresee the freedom acquired for the citizens. It is more considerate to develop policies that spearhead national security since they propel citizen's liberty in the country (Akhgar et al., 2015). Therefore, when a country encounters insecurity, the people's freedom deteriorates immensely. In the process of acquiring constitutional security, people prosper tremendously due to liberty blessings.

The US adoption of policies has led to the rapid protection of the country's security and the people's freedom in acquiring luxuries. The cease of luxury exposure by the citizens leads to the suffering of the country. As national security mitigation measures, the federal government mandates to protect civilians from the alien attacks (Alperen, 2017). It is essential to integrate national laws in curbing any nature of the threat. Due to the anti-terrorism package administration, civil liberties become protected for the nation (Ammori et a.l, 2010). Even though America has drafted milestones to balance the civilian's civil rights and enforcing homeland safety, it is essential to develop more future laws due to the evolving nature of threats. Therefore, as long as enemies of the US exist, civilians will never attain freedom. Despite that, any elements, like affiliation of terrorism to America's destroy the Constitution, should become shunned for escalation of human rights (Morag, 2018).

Read More
Therefore, there lacks a clear guideline principle between cybersecurity and internet freedom. The proposed guidelines should allow cybersecurity without interfering with the national neutrality rule. The ISPs play a significant role in ensuring detecting security malfunctions, and due to their escalated economies of scale, they provide services in a cost-efficient way. They also detect hidden threats through network filtering. Despite that, it is essential to impose penalties on ISPs in case of security threats since most of them focus on economic inducements.

Of the documents reviewed in class (excluding the US Constitution), which do you feel serves as the most important at this point? Be sure to provide significant support for your argument.

The article " Security versus Freedom" on the Internet is essential since it examines the effects of the global Internet on human beings. It is the mandate of the global policymakers to safeguard civilians from internet threats, like cyber attacks and espionage. Such an insecure network has resulted from the internet freedom given to civilians under the network neutrality or open internet regulations. For example, the lack of internet control by Internet Service Providers (ISPs) from blocking some online technologies encourages intense security threats (O'Sullivan et al., 2015). Therefore, the regulations should assign the ISPs to control over the Internet to ensure cybersecurity. Nowadays, the international policymakers spearhead for internet security to discourage violent behaviors, such as cyberbullying and the escalation of cybercrimes. Despite the freedom allowed for ISPs to block harmful content, ISPs should not block legitimate technologies as per the internet security guidelines (Ammori et a.l, 2010). Therefore, there lacks a clear guideline principle between cybersecurity and internet freedom. The proposed guidelines should allow cybersecurity without interfering with the national neutrality rule.

The cyber threat arises from the untrustworthy nature of several primary stakeholders embedded with the rapidly evolving scope of internet threats. The constitutional laws serve as the essential remedy for ensuring balance and checks for the changing technological developments. It is necessary to protect national welfare and preserve human dignity (O'Sullivan et al., 2015). Besides, both the public and private-owned companies should ensure they protect the Cyberspace from terrorists. Insecurities may arise in cases of sharing sane internet infrastructure. The cyberattacks can be either in the form of espionage, attack, or fraud (Ammori et a.l, 2010). For example, the international students in China attacked Google Corporation data possing a threat to its operations. With the rapid escalation of terrorist attacks, like military demand communications, it is essential to ensure people's safety, primarily for both military and private-owned security firms to provide humanitarian protection (Newsome et al., 2015).

It is essential to adopt the cybersecurity policy for the ISPs to curb threats. Firstly, botnet consists of the integration of various client network systems, thus malware dissemination. Through cyber attacks, the criminal's souvenir restricts data, obtains web banking statistics, and implements them from organizational Command-and Control distributors. The IoT connection to electronic devices such as laptops makes cybercriminals to deploy botnets attacks. 'The botnets have contaminated approximately 2.5 million electronic devices globally.' (Pawar et al., 2016). The use of the botnets by attackers leads to the execution of the service denial to multiple IoT gadgets. The sophisticated botnets make it difficult for organizations to manage the attacks. Denial of Service (DoS) has led to storage system overload due to multiple notification requests. 'Cybercriminals use the strategy to minimize or undermine service operations for business reputation destruction rather than stealing their data' (Bakhshi et al., 2018). Read More

Cite this document
  • APA
  • MLA
  • CHICAGO
(National Security on the Internet Assignment Example | Topics and Well Written Essays - 2750 words, n.d.)
National Security on the Internet Assignment Example | Topics and Well Written Essays - 2750 words. https://studentshare.org/information-technology/2091860-national-security-on-the-internet
(National Security on the Internet Assignment Example | Topics and Well Written Essays - 2750 Words)
National Security on the Internet Assignment Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/information-technology/2091860-national-security-on-the-internet.
“National Security on the Internet Assignment Example | Topics and Well Written Essays - 2750 Words”. https://studentshare.org/information-technology/2091860-national-security-on-the-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF National Security on the Internet

Global Internet Security

hellip; the internet plays a crucial role in the concept of globalization because it is because of the internet that the world has become a globe where people can correspond with one another in every little.... Because of the internet, there are many global internet security concerns.... This paper ''Global internet Security'' tells that internet is employed in businesses, educational institutes, governmental institutes, social institutes, researching, and many other places because it keeps the capability of allowing a communication path that is easier, wider, faster, and user friendly....
19 Pages (4750 words) Essay

Attacks on national security through the use of Internet and computers

One of the major features of cyber warfare is the ability to attack even Attacks on national security through the use of Internet and computers Attacks on national security through the use of Internet and computers “Cyber warfare or information warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means”(Billow & Chang, 2004, p.... The development of computers and internet related technologies have opened a new channel of warfare for advanced countries....
2 Pages (500 words) Research Paper

National Security Versus Civil Liberty

The paper "national security Versus Civil Liberty" looks at instances where the civil rights are violated so to emphasis on the importance of the government to ensure that it does not cross the limit.... hellip; This paper looks at the issue of sacrificing a few freedoms to protect national security, both the internal and external security and to ensure the long term viability of civil rights.... national security includes internal and external security of a country....
6 Pages (1500 words) Coursework

Cryptology Advancing National Security

hellip; This essay demonstrates that there are constant threats to national security with government servers constantly coming under attack, as people have now developed technology that is able to break advanced encryption protocols and in that way gain access to sensitive password-protected information.... In a day and age where people are very keen on computer programs and able to hack into national security databases, it is now more important.... In the same way that no one wants a thief having their bank details, we also do not want terrorists having sensitive national security information....
7 Pages (1750 words) Essay

The Language and Use of Acceptable Usage Policy

The paper "The Language and Use of Acceptable Usage Policy " describes that despite having positive usage purposes, it has been observed that detection of abuse has remained a daunting task for investigators as the internet has no international boundary separating one country from another.... the internet is composed of numerous networks which have created their own virtual world in which they cross local, national and international boundaries and provide access to millions of users globally; so, in order to provide access only to legitimate users, it is highly essential to develop and implement AUP (Fielden, 2001)....
7 Pages (1750 words) Essay

Securing America and Private Sector Role In National Security

The term paper "Securing America and Private Sector Role In national security" states that since the terrorist attack of September 11, 2001, the law enforcement and the law enforcement agencies have been increased tremendously compared to the traditional crime response and prevention mechanisms.... hellip; Notably, the homeland increased its security work within counties, cities, and states.... The private security organizations have been put under the same pressure to ensure that people and information are protected with the collaboration with homeland security....
7 Pages (1750 words) Term Paper

Internet of Things and Internet Security

nbsp; In the near future, the cost of the internet will be cut down.... the internet will give more personalized and intelligent services on its own.... Despite the advantages offered by the internet, there are growing concerns regarding security issues.... Although it is an open platform providing various benefits, there is much exploitation in the technological and application level of the internet.... Protocols and technology relating to the internet are standardized by W3 Consortium, an independent organization founded at MIT in 1994....
12 Pages (3000 words) Case Study

Role of Computer and Information Security in Defining Current National Security Issues

Indeed, the advancement of computers and information available via the internet enhanced and shaped the national security strategies in the United States (ODay, 2005).... "Role of Computer and Information Security in Defining Current national security Issues" paper states that the use of computers and information availability has highly resulted in many national insecurity issues in many countries, hence affecting most of these countries economically and socially....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us