StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Possible Futures of Cyber Conflict - Essay Example

Cite this document
Summary
This essay explores the security risks and breaches that have been permeating through the Internet. The risk assessment and management efforts entail assuming a proactive stance to prepare through awareness, prevention, protection, response and recovery measures…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
The Possible Futures of Cyber Conflict
Read Text Preview

Extract of sample "The Possible Futures of Cyber Conflict"

In an article written by Healy (2011), the possible futures of cyber conflict and cooperation reveal the extent and degree of vulnerabilities and threats of cyberwar; thereby, recommendations have been divulged to include “quickly patching vulnerable or infected computers, making it difficult for attacks to transit the core networks, and engaging in a dialogue with international partners to find areas of common concern and mutual action” (p. 6). The efforts to engage in continuous dialogue prove that there is a need to monitor and regulate activities on the Internet to avoid damage to users.

In an article written by Healy (2011), the possible futures of cyber conflict and cooperation reveal the extent and degree of vulnerabilities and threats of cyberwar; thereby, recommendations have been divulged to include “quickly patching vulnerable or infected computers, making it difficult for attacks to transit the core networks, and engaging in a dialogue with international partners to find areas of common concern and mutual action” (p. 6). The efforts to engage in continuous dialogue prove that there is a need to monitor and regulate activities on the Internet to avoid damage to users.

Finally, in a published report by the Homeland Security (2011) on “Blueprint for a Secure Cyber Future”, it was emphasized the cyberspace poses the most serious threat to national security; therefore, in line with the vision of securing cyberspace more effectively, it was disclosed that “regulatory agencies will have the tools and staff needed to ensure that regulated entities implement appropriate security measures” (p.  5). As such, the efforts to regulate diverse activities and information on the Internet have been acknowledged to be eminent to make cyberspace ultimately secure.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Possible Futures of Cyber Conflict Essay Example | Topics and Well Written Essays - 368 words, n.d.)
The Possible Futures of Cyber Conflict Essay Example | Topics and Well Written Essays - 368 words. Retrieved from https://studentshare.org/technology/1600169-hs610-week-7-conference
(The Possible Futures of Cyber Conflict Essay Example | Topics and Well Written Essays - 368 Words)
The Possible Futures of Cyber Conflict Essay Example | Topics and Well Written Essays - 368 Words. https://studentshare.org/technology/1600169-hs610-week-7-conference.
“The Possible Futures of Cyber Conflict Essay Example | Topics and Well Written Essays - 368 Words”, n.d. https://studentshare.org/technology/1600169-hs610-week-7-conference.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Possible Futures of Cyber Conflict

Does Dr Who tell us about science and technology or the Britain of its time Discuss

The series incorporates elements of science and technology, through illusions, imaginary narrative, through its unique representation of character and events, like Aliens, cyber men, Sonic Screwdrivers etc.... The show has presented many technological elements which are either inevitably possible or impossible.... Some believe that the ideas in the series are beyond human imagination, whereas some ideas seemed quite reasonable with the foreseeable science and are believed to be possible....
12 Pages (3000 words) Essay

Palestinian Israeli Conflict

The paper "Palestinian Israeli Conflict" focuses on the possible solutions for Palestine – Israel conflict which is associated with so many political, social, cultural and religious aspects.... The author of the paper also discusses obstacles for reaching a solution for this conflict.... hellip; Arab-Israel conflict is mainly because of the conflict between Palestine and Israel.... In fact, this conflict has been taken some dangerous dimensions since the entire Muslims in the world consider it as an intrusion of Jews culture into Muslim beliefs....
6 Pages (1500 words) Coursework

Avoiding Cyber Threats in E-Commerce

Business organizations face millions of cyber attacks daily.... The paper "Avoiding cyber Threats in E-Commerce" provides a deep insight into measures available to prevent cyber-attacks - intrusion detection prevention systems, firewalls, encryption, anti-virus software, and login passwords, and programs for enhancing consumers' awareness of security.... hesis statement: e-commerce is safe from cyber-attacks because it has sufficient mechanisms to defend critical attacks and respond to any cyber-attacks....
6 Pages (1500 words) Essay

Cyber Techniques and International Tensions

Cybersecurity measures tend to involve various steps, the most important of these steps being a state's understanding of the different forms of cyber attacks that it is likely to encounter.... The paper "cyber Techniques and International Tensions" describes that the development of better cyber techniques has led to a situation where a number of countries attempt to hack into other countries' computer systems for the sole purpose of stealing trade secrets....
11 Pages (2750 words) Essay

The Near-Term Future of UK Air Power

The future will involve the increasing importance, for example, of engaging in space and cyber technology as a means of further refining the overall strategy relating to air power, both within the borders of the United Kingdom, and beyond (Blount, 2009).... The force itself it the pride of the country and has served to solidify the nation's defense, both domestically and abroad, for the better part of the century....
8 Pages (2000 words) Essay

Emergency, Exception and New Technologies in International Relations

Again, he asserts that the world is yet to experience a serious form of cyber conflict because no stringent countermeasures exist in preventing such (Lin, 2012).... In his 2012 article titled “cyber conflict and International Humanitarian Law”, Herbert Lin highlights the vulnerability to cyber conflict which the globe is continually immersing itself into.... ?? Lin asserts that cyber conflict has attained a level where it is a humanitarian issue but it is still not fully addressed by existing interventions such as the Geneva Conventions and the UN Charter....
4 Pages (1000 words) Essay

Situational Awareness Analysis Tools

The paper "Situational Awareness Analysis Tools" examines the motives behind the cyber attack, the location of the attack, the person and objectives, the capabilities and weaknesses of the attacker, the impact of the attack on the operator's domain, and how the attack could be defused beforehand.... hellip; Situation awareness in cyber (CSA) defense entails the realization and recognition cognitively, of the performance of the technical enterprise, the relationship between technical performance and sets of missions that are under support, recognition of threats internal and external toward the enterprise, and have the activity awareness in relation to the broader agency....
9 Pages (2250 words) Research Proposal

Treatise on International Criminal Law

The commonalities described here are related to the actors involved, the existence of an international conflict and capabilities that are disabled through the blockade.... It is referred to as cyber wars or armed conflicts according to international conventions.... This paper examines three notions about international armed cyber conflicts.... That is the aspect of the cyber blockade, geographical limitations in cyber warfare and noninternational armed cyber conflicts....
13 Pages (3250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us