Essay on web security

Document Type:Research Paper

Subject Area:Technology

Document 1

Cyber identity fraud is the quickest developing crime in the world, happening when the criminal get personal or business data and utilizes it to get for financial gains. In this day and age of data innovation, numerous criminals go after their exploited people by means of the Web. The high level of divulgence of individual data is the thing that leaves such huge numbers of people and organizations open to fraud. Two of the most widely recognized ways that criminals get individual data to help them in data fraud are phishing and pharming. Phishing uses mass email messages to tempt beneficiaries into uncovering individual data. Theft that is executed using the computer networks or the other ends with aim of accessing confidential individual or organizational identities to use them in fraud activities.

Sign up to view the full document!

Cyber security on the other hand refers to the means that are employed to protect the individuals, business organizations and government agencies from cybercrimes through protecting all computer systems which are internet connected. Security is composed of physical security and cyber security which are utilized to ensure that enterprises are covered and protected against illegal access to computerized systems and data center. This paper therefore focuses on the importance of imposing important cyber security protocols which are regulated by the government and other affiliated entities to ensure effective protection of businesses, individuals and government agencies from cyber fraud. It also identifies the threats and the importance of having the good protocols in cyber security matters. Cyber Security The importance of cyber-security is important at this stage where a lot of information; and important one at that is transmitted to and fro in countries.

Sign up to view the full document!

This information might be crucial for the parties that are communicating and it is important that the people who are a part of the world respect and adhere to the policies and rules that apply to being an ethical part of the cyber world (Bisson, 2015). With the advent of the Internet came a need for defining limits in terms of what is allowed and what is not for its users, as it opened the gateway for unlimited information sharing. While most of the users are genuine, there also are certain users who take to this platform to cause trouble and inconvenience to others (Department of Homeland Security, 2015). The information that is available on such platforms is extensive, which is why vigilance is required in order to maintain the integrity of the platform as well as to maintain safety among people.

Sign up to view the full document!

The government builds the technological infrastructure after having invested a lot, which makes it important for them to take measures to protect the infrastructure and related information. There are a number of cyber-crimes that have been known to have traditionally existed however lately they have shifted to a more technologically advanced platform. Even though the cyber threats that have already existed in the system have been dealt with in an appropriate manner, there always is a looming threat of these systems and processes becoming more sophisticated and attacking confidential government information. There also are major conflicts that have been surfacing through the recent NSS reports and the numbers of threats that are faced by the country through the cyber-threats have been increasing day after day.

Sign up to view the full document!

There are multiple ways in which the national security of countries is threatened through various actions that are taken by a number of ill users of Internet has made it important for the homeland security and other major security agencies in the country to be wary of potential threats through the cyberspace. The government’s effort to collaborate with the private industry clearly shows the urgency in the implementation of cyber security regulations. This effort was also in the light of making sure that the companies are encouraged to take steps of their own to protect the privacy of the related citizens. These private companies take active steps in preventing cybercrimes through steps such as firewalls, tracking IPs, detectors for intrusion and prevention as well as encrypted password systems.

Sign up to view the full document!

These systems at its most basic level are able to stop malicious threats from attacking private information and codes on their websites. It has become mandatory for the industry to regulate the cyber use by understanding and evaluating the risks that arise out of the usage of cyber space. There also have been a number of information and software that have prevented spies from attacking private information. These bills have been seldom turned into laws however, the government has become a lot more conscious about the threats that the country faces due to the cyber threats. The main reason as the government pointed out is the repeated attempts to intrude into the cyber infrastructure that the government has created for the security of the United States.

Sign up to view the full document!

There are a large number of organizations that support the government in regulating the system of protecting the nation against what the nation considers the highest level of threat, cyberspace threat (Rozenswig, 2012). These threats have become even more serious due to the recent events concerning ISIS, a terrorist organization that telecasted disturbing images and videos of people getting slaughtered online for people to see. The governments informed by the serious need to manage and regulate this information are stood out to collaborate with private companies and individuals so as to guarantee the security. There is a need for managing the safety and security in a way that would make sure that the information is not exposed to entities that should not have access to the information.

Sign up to view the full document!

There also is a need for protocols that would manage the information so that it is not exposed to people other than whom it is framed and meant for. The private organizations have the responsibility to make sure that the information that they maintain should be secured with the necessary protocols and regulations (Global Policy Forum, 2014). The responsibility that the company takes up along with the information that they need to regulate in order to protect the customers is managed through innumerous protocols. The companies need to be responsible for the prime aim of the government to prevent any kind of cyber war that might be starting anywhere in the world through their network. One of the best instances for this would be companies such as Vodafone, Ericsson, Facebook and Twitter where millions of people share a lot of personal details in the form of signing up or in the form of sharing with the world.

Sign up to view the full document!

Suspicious actions and messages are kept an eye on and should be reported immediately by the companies in order to prevent any kind of potential crime that could be caused due to such messages. The government announced this particular regulatory act in order to prevent any kind of fishy actions along with giving the companies the chance of bringing voluntary action. The fact that even banks have been included highlight the importance of the action as banks would have private information about the customers including their financial details and statuses which if anyone would get access to, could be misused and exploited (Sasso, 2012). com: http://www. tripwire. com/state-of-security/government/a-cyber-study-of-the-u-s-national-security-strategy-reports/ Department of Homeland Security. Cybersecurity Overview. Retrieved September 18th, 2015, from dhs.

Sign up to view the full document!

Regulationa and Oversight of PMSCs. Retrieved September 18th, 2015, from globalpolicy. org: https://www. globalpolicy. org/pmscs/50211-regulation-and-oversight-of-pmscs. The Heritage Foundation. Sasso, B. After defeat of Senate cybersecurity bill, Obama weighs executive-order option. New York: The Hill. The White House.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable