StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Current Events discussion in the Technology or Security Arena - Assignment Example

Cite this document
Summary
However, the breaching of US military social media accounts was what may have shocked the world most. The rising tide of system security breaching seems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Current Events discussion in the Technology or Security Arena
Read Text Preview

Extract of sample "Current Events discussion in the Technology or Security Arena"

ISIS Hackers Breach U.S. Military Social Media Accounts Late last year, the Sony hacking left the world surprised that the rogue state of North Korea could hack a US based company. However, the breaching of US military social media accounts was what may have shocked the world most. The rising tide of system security breaching seems to have gone a notch higher. According to the Clarion Project, the ISIS successfully hacked YouTube and Twitter accounts belonging to the US central command. The hackers also posted propaganda video on the central command’s YouTube account.

According to the threats posted by ISIS, the terror group claimed that they retrieved sensitive information about the US Army including their close families. Meanwhile, the Pentagon reported that no sensitive information was on the social site. US authorities affirmed that no classified information is ever posted on the social site. Authorities also confirmed that the hackers did nothing much except to take control of the Megaphone (Clarion Project 1). The incident lasted for 40 minutes, during which the ISIS bragged and issued threat the best way it could.

The fact that computer systems can be hacked remotely is not a new phenomenon except that it is a big question which system is hacked. Online companies have found themselves dragged into wars that many of them are hardly prepared. The fact that many social websites allow users to post on their walls or those of others, it seems that a security breach portal is always open for manipulation. That implies that such limited permission encryption for posting on another user’s wall can be de-encrypted in part for hacking.

Obama, Cameron Promise To Cooperate On CybersecurityIn a related incident, the problem of system security, particularly cyber security, is now being treated with the seriousness it deserves. Governments have realized that as long as they are going to use some of the services offered by social media, the have to protect them. Such protection may imply formulating new laws that regulate what is to be released to the public. While responding to questions, Cameron hinted that given the present of terrorism, it is important that governments wake up to the realization that the digital era requires monitoring of communications (Horsley 1).

The specific security question that came out was the observation that social media companies, for instance, Facebook and Google, are offering high-tech encryption technology. Cameron observes that by offering unbreakable codes, social media companies are putting security of citizens in risk. That is because terrorists can manipulate such codes for unethical practices. That is to imply that the current dilemma of cyber security is partly a problem created by parties oblivious of the consequences of their actions.

Given the stiff nature of competition, and given the right to privacy, property ownership and patent rights, such companies would be reluctant to share their security codes with the government. Doing so would technically implies ceding the administration of their system to the government. As it is now, system administrators should consider implementing other additional security features such as restricting access using IP. Gmail and Facebook, for instance, have implemented a system that synchronizes a security code to the user phone.

Should a different IP attempt to login, it has to be preceded by manual entry of a system generated security code. Such an approach may improve the current predicament. Works CitedHorsley, Scott. “Obama, Cameron Promise To Cooperate On Cybersecurity.” NPR, 2015 January 16. Accessed from http://www.npr.org/2015/01/16/377780818/obama-cameron-promise-to-cooperate-on- cybersecurityThe Clarion Project .Org. “ISIS Hackers Breach U.S. Military Social Media Accounts.” January 13, 2015. Accessed from http://www.

clarionproject.org/news/isis-hackers-breach-us- military-social-media-accounts

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Current Events discussion in the Technology or Security Arena Assignment”, n.d.)
Retrieved from https://studentshare.org/information-technology/1674653-current-events-discussion-in-the-technology-or-security-arena
(Current Events Discussion in the Technology or Security Arena Assignment)
https://studentshare.org/information-technology/1674653-current-events-discussion-in-the-technology-or-security-arena.
“Current Events Discussion in the Technology or Security Arena Assignment”, n.d. https://studentshare.org/information-technology/1674653-current-events-discussion-in-the-technology-or-security-arena.
  • Cited: 0 times

CHECK THESE SAMPLES OF Current Events discussion in the Technology or Security Arena

What Is Public Opinion

Name: Instructor: Course: Date: discussion questions Public opinion is the general belief and attitude of the people especially on issues that affect their daily life.... It aggregates many individual opinions and it is from this that a conclusive order of action is arrived at.... hellip; Public opinion is determined by at least three major factors namely attitudes, opinions and actions....
9 Pages (2250 words) Term Paper

Biometric Technologies vs Traditional Security Methods

BIOMETRIC TECHNOLOGIES VERSES TRADITIONAL security METHODS Name University Course Instructor Date Introduction Companies strive to protect their assets, information, and offer means of access regulation to such vital information.... hellip; For years, traditional security strategies such as personal PINs and passwords have been in use but with various limitations.... Currently swipe cards and personal identification numbers have been introduced for increased security....
5 Pages (1250 words) Essay

Legal Issues of Homeland Security

The essay "Homeland security" is purposed to give an information about Homeland security Act that was signed by President Bush In the East Room of the White House on November 25, 2002.... With my signature, this act of Congress will create a new Department of Homeland security, ensuring that our efforts to defend this country are comprehensive and united,” said President Bush.... Some of the evolving problems also included: the failure of the VCF technology to meet the bureau's requirements the intense pressure to get the product to FBI agents following the terrorist attacks of 9/11 the change in the FBI's prime mission from criminal investigation to preventing terrorism....
6 Pages (1500 words) Essay

Wembley stadium management

t is one of the key places to hold International Sports Event Management with security System.... t is one of the key places to hold International Sports Event Management with security System.... "Wembley will provide the luxurious conditions in which to host the leading conference on sports event management and security.... It is promised to be one of the world's greatest stadiums, with outstanding facilities, unrivalled acoustics and sell-out sporting matches - all under it's retractable roof" (Arup, 2007) This great facility and the magnanimous scale at which the events would take place requires a team of skilful people to manage the smooth and efficient event management as well as security, to ensure maximum customer satisfaction with the experience....
6 Pages (1500 words) Case Study

Naturalization Complicated for Many Immigrants by Marlena Hartz

In the paper “Naturalization Complicated for Many Immigrants by Marlena Hartz” the author analyzes the article by Marlena Hartz.... nbsp; The article showcases the story of Mexican woman called Maria Valenzuela who arrived in the United State from Mexico 18 years ago.... hellip; The author describes that the story of this woman is narrated in order to make the audience understand the struggles immigrants endure in order to integrate themselves in US society and become legal citizens of the land of opportunity....
5 Pages (1250 words) Essay

The New Wembley Stadium

It is one of the most spectacular football stadiums in the world, with long term commitment to games… It is one of the key places to hold International Sports Event Management with security System.... “Wembley will provide the luxurious conditions in which to host the leading conference on sports event management and security.... It is promised to be one of the world's greatest stadiums, with outstanding facilities, unrivalled acoustics and sell-out sporting matches - all under its retractable roof” (Arup, 2007) This great facility and the magnanimous scale at which the events would take place requires a team of skilful people to manage the smooth and efficient event management as well as security, to ensure maximum customer satisfaction with the experience....
6 Pages (1500 words) Case Study

Visual Culture Industry

Museum Victoria CaseIt is important to understand that Museum Victoria presents a collection of contemporary and historical issues in the disciplines of science, indigenous cultures, technology and history.... The location of the section is in the grounds of the Spotswood Pumping Station that boats of its popularity with regard to the presentation of museum features associated with science and technology (MuseumVictoria, 2015).... The Internal StructureThe MIFF CaseThe Melbourne International Film Festival (MIFF) has gained substantial reputation in Australia and the entire world following its ability to present the best in current cinema, retrospectives, discussion programmes and tributes....
8 Pages (2000 words) Essay

Future of Operating System Security

… The paper “Future of Operating System security” is a great variant of an essay on information technology.... Computer security is a challenging and versatile field, and so making certain personal data privacy, stopping illegal computer systems' access, guaranteeing back-up emergency strategies after data loss, and securing systems from activities that are malicious like worms and viruses are crucial.... The paper “Future of Operating System security” is a great variant of an essay on information technology....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us