StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber security - Coursework Example

Cite this document
Summary
I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Cyber security
Read Text Preview

Extract of sample "Cyber security"

CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork?I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space.

This is a true reflection of what takes place when digital data storage is used. The fact that digital storage can cause delays when authorization is needed before files are accessed is an indication that digital storage should be carefully executed. More than one person should have passwords that permit accessibility of files. This can save time wastage when one person who has the password is sick, on vacation or is dead. Individuals with the passwords should be known so that any breach or leakage should be traced to the one responsible.

In as much as several governments are trying to come up with e-government systems that have user friendly and basic graphical interface, they should put up measures that ensure that information security is maintained. They should not only focus on minimizing the costs of data storage. They should lay emphasis on data privacy and confidentiality.2. Cyber-crime is a transnational issue that makes extradition exceedingly difficult. Using the Wikileak’s case, discuss whether or not the breach of the U.S. classified network warrants the extradition and trial of Wikileaks founder Julian Assange in the United States.

Data security is an essential issue when it comes to security information of any nation. Strict international laws against data leakage are inevitable for the benefit of every country. Trials of individuals who breach another country’s security network should be left for the aggrieved country. Data breach and leakage should be considered a crime, whether it is done from an office or at home. The United States government is unable to try Mr. Assange, a Swedish and founder of Wikileaks, for breaching the confidentiality of the United States security and official data.

The United States cannot try him since there is no international rule that considers his actions a crime. Additionally, national rules and laws of a single state cannot be applied to citizens of other countries. It is extremely essential that cyber security be considered a vital issue in a meeting of the United Nations. In the meeting, it is anticipated that the organization should declare cyber breaching and leaking a global crime, so that the trial of those culprits should be undertaken by the aggrieved countries, irrespective of the geographic boundaries.

Additionally, cyber-crimes penalty should be standardized. Lastly, e-governments should discover new and advanced ways of maintaining cyber security.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber security Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Cyber security Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1603990-cyber-security
(Cyber Security Coursework Example | Topics and Well Written Essays - 500 Words)
Cyber Security Coursework Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1603990-cyber-security.
“Cyber Security Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1603990-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber security

Cyber Security Vulnerabilities and Associated Threats

This paper ''cyber security Vulnerabilities and Associated Threats'' discusses that cyber threat has remained a top concern in most nations because of security concerns.... Research and study have found out that cyber security has continued to increase in intensity and sophistication with time.... Research and study have found out that cyber security has continued to increase in intensity and sophistication with time.... Cyber threat has remained a top concern in most nations because of security concerns....
7 Pages (1750 words) Term Paper

Cyber Security and Information Security

Textbook: Management of Information security by Whitman and Mattord Chapter 2 P.... Another interesting thing to consider is that there may be a risk from collaboration between insiders and outsiders, which could pose a significant risk to information security.... The change may also be due to the fact that many corporations are aware of the risk from outside the company, and thus information security has been tightened up in the last decade making it very difficult for outsiders to attack without relevant passwords or passkeys....
4 Pages (1000 words) Assignment

Chinese Versus American National Cyber Security

This paper ''Chinese Versus American National cyber security'' tells that Cybercrime is a reality that has hit the information networks in a world driven by computer and internet technology.... Countries are engaging national cyber security policies to ensure information security as data traverses the information networks.... The purpose of this study is to compare the effectiveness of the national cyber security policies that have been applied in China and America and to provide viable solutions to the weaknesses in these policies....
11 Pages (2750 words) Research Proposal

Private Network and Cyber Security

This paper under the headline "Private Network and cyber security" focuses on the fact that to prevent an external IP address from somebody pretending to be an internal user, it will be necessary that packet rules with combinations of filters are used.... Companies are also keen to release any of the important information regarded as business security and such information is normally protected with passwords and cookies which prevent hackers from obtaining them (Mason pg 7)....
1 Pages (250 words) Assignment

Sample Cyber Security Profile

This paper discusses the many facets of protecting these vulnerabilities against large-scale attacks… One of the most crucial elements to understanding within the realm of security is the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element According to many publications, NIST is very proactive in this element as one of the main is attacks on User Domain....
4 Pages (1000 words) Essay

Cyber Security and Startups

The attack targets… The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort cyber security and Start-ups What is a DDoS attack?... The attack targets significant resources used by business organizations, security firms or schools by making it a challenge to access the information.... They do not also install security measures to protect against such attacks, which make them vulnerable to pay the ransom demanded....
1 Pages (250 words) Case Study

Cyber Security in Business Organizations

With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks.... Johnson and Goetz (2007) describe security risk management as a balance between “maintaining security” and keeping the Information security failures tip the balance and expose organizations to the aforementioned threats.... Organizations are challenged by the trend to ‘go global' which implies that security programs should encompass the entire global market of a firm....
5 Pages (1250 words) Case Study

Cyber Security and Digital Forensics

This paper "cyber security and Digital Forensics" argues that many businesses are unaware of attacks and have slow responses to these risks that endanger the security of the entire organization.... nbsp;The rapid penetration of the internet has raised the potential for security threats for businesses globally.... Malware is a common term applied in defining malicious software that contributes to security threats to a computer system and the internet (Rossow 5-6)....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us