StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Crime National Strategic - Term Paper Example

Summary
The paper "Cyber Crime National Strategic " presents that mission-critical aspect of the current trend of physical and electronics computer security and, at a later stage, also examines the future trends that could emanate from computer usage in the 21st Century…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Cyber Crime National Strategic
Read Text Preview

Extract of sample "Cyber Crime National Strategic"

Cyber Crime Project Introduction: This paper considers mission critical aspect of current trend of physical and electronics computer security and, ata later stage, also examines the future trends that could emanate from computer usage in the 21st Century. The salient aspects that need to be touched upon in these areas are as follows: 1. Current Trends for computer security techniques 2. Current Trends for computer privacy practices 3. Future trends for computer security systems 4. Future trends for computer privacy in cyber space It is now necessary to examine each of the above sub-sections one by one in order to arrive at a proper consensus. 1. Current Trends for computer security techniques: It could be reasonable stated that technology, though extremely beneficial to any field, also suffers from various drawbacks and challenges. A similar situation does arise in the case of applying current trends for computer security. With regard to computer security, the following aspects first need to be considered: Online identity thefts: It is possible for unauthorised persons to perform identity thefts by gaining access passwords, PIN, and personal details of computer users to be stolen and then illegally used by impersonators and fraudsters to access bank accounts and other treasury accounts. This is one of the major risks that need to be guarded against, now only because it is difficult to track down such impersonators, but also even more onerous task to bring them before the due process of law due to lack of evidences, witnesses and material proof. Security to guard against systems failures: Secondly, there may be a total systems failure due to malfunctioning of critical components. If alternatives are not presented, this could lead to losses running into billions of US dollars, or money equivalent, depending upon the country in which these issues arouse. Thus, it is necessary computer Security systems work well, but in the event of a crisis, this could be severely put under test. Therefore, it becomes necessary that the security aspect is prioritised as first and foremost, during the installation of the original system. This can possibly ensure prevention of future breakdowns or loss of man days due to systems malfunctioning and non –operation of computer systems. Also regular computer security mock exercises need to be conducted to make the employees acquaint themselves to such crises and remain operationally competent and fighting fit to tackle any emergency, small or big. The very benefits of computer systems could prove to be its undoing. Security systems could be rendered useless, and could be damaged by hackers, invaders or infiltrators from anywhere, and it could also be susceptible to viruses, worms or other forms of attacks from unknown sources. The best way to overcome these threats would be to by doubly reinforcing security and protection aspects on a constant and regular basis and to protect computer security from possible acts of violation of security and the subversive actions of criminals and fraudsters. It also becomes necessary to introduce suitable robust legislation to counter threats to computer security. 2. Current Trends for computer privacy practices: The current trends towards computer privacy practices need to commensurate with the level and degree of threat towards it. By and large, the privacy threats could arise from external sources, when malicious intenders are able to gain access of IP Addresses and the access codes of genuine users. Thus the following aspects are very important. 1. Firewalls are mainly designed and operationalised to separate the internal networking segments from the internet system, thus ensuring confidentiality and privacy of sensitive data. 2. High security data should be entered through Encryption method. 3. Users should be provided additional secure access passwords in the banks for ensuring total privacy of computer transactions. 4. Computer maintenance companies and software designers ensure automatic log out for accounts which are inactive for designated period of time. 5. Secure devices are installed in order to ensure total security, protection and confidentiality of data generated from/to customers. The Access code devices are permanent and a one time coding, and should only be informed to the customers through their registered Mobile SMS, ensuring complete privacy and protection during computer usuage. 6. Security aspects are reinforced by ensuring that high risks privacy functions are not cantered on one person alone and is the joint responsibility of several persons like responsible for systems analysis, networking configuration, access control and maintenance, system installation, changing the operating parameters, etc. 3. Future trends for computer security systems in cyber space: The main trends seem to be in terms of cryptography, which is the enforcement of security layers around devices which store important and confidential data “Today, computers process information using tight algorithmic logic from a carefully controlled set of inputs -- the way they are supposed to. Tomorrow, computers may use techniques of logic processing, or neural network technologies to sift through a trusted set of material and bring things up to human attention.” (Libicki). Use of modern technology that is in testing, experimental and laboratory stages at present cannot also be ruled out, once these tests turn positive and gain approval from the appropriate Government agency. Besides this there are also concerns that the networking mass of routers, domain name servers and other computer related devices that put the system together should not break down, otherwise this could spell real disaster for users and corporates. It is important that testing of modern and ultra modern computer security needs to be in line with needs and requirements, serving cost benefit advantages and create the right kind of environment for corporates to make use of advanced technology for common good. 4. Future trends for computer privacy in cyber space through reform measures: Perhaps one of the major aspects that impinge upon computer privacy is the country specific laws and their implementation. It would be most relevant to mention here that, in as far as legislative trends for affording major privacy is concerned, the US offers better privity and privacy than its European and EU counterparts. This is because in the US, computer privacy laws are market oriented and driven and only allows limited statutory protection to Common Law rights for information privacy. On the other hand, Europe and more appropriately, the EU nations favor a multifaceted and comprehensive privacy protection regime for its citizens. Thus, along the cyber highway, there are occasion when country specific laws may become conflicting in nature, and here is where reforms are not only necessary, but are urgently to be enforced. A set of futuristically designed computer privacy rules and user friendly privacy regime that could be enforced at a global level is the need of the hour. This would not only enforce reliable, user friendly and above all, consistent set of rules for trade partners to impose, but could also be seen in terms of improving and reinforcing future laws that may not be consistent with current practices. The future trends in privacy norms would attach greater significance to need for total encryption, in terms of several layers of privacy and confidentiality, and also through a process of involving everybody in the war against cyber crime by encouraging scholars, experts and professionals of cyber law to engage more abundantly with the IT industry, policymakers and members of the general community to become more concerned with the way the need for inducting and enforcing robust cyber fighting laws affects people and corporate of this country as individuals and the overall governmental structure as a complete and unfied entity. Conclusion: The war against all manifestations of cyber crime is indeed an onerous and pain staking one, involving in its wake, the entire crime fighting and administrative machinery, not only of this country, but also of other concerned countries in the world. Works Cited Libicki, Martin. The Future of Information Security. Institute for National Strategic Studies. Web. 25 Aug. 2010. . Read More

CHECK THESE SAMPLES OF Cyber Crime National Strategic

New Technologies and the Emergence of Cyber Crime

The paper 'New Technologies and the Emergence of cyber crime' discusses the effects of cybercrime on the citizens, businesses, government, and the relevant interventions to deal with it.... Moreover, threats to the critical infrastructure and national interests are rising by using internet for criminal and terrorist activities (Cevidalli, 2010).... Under the light of this crime, we will see the effects it has created on the economy of the United Kingdom....
20 Pages (5000 words) Dissertation

Cyber Crime as opposed to Cyber warfare

The paper entitled "cyber crime, as opposed to Cyber warfare", concerns cyber crimes.... Problem Statement Although systems and software developing IT organisations (such as Microsoft, Apple, IBM) have been striving to deal with the rising menace of cyber crime, there is dire need to develop strong anti-virus software's to ensure information security.... Although systems and software developing IT organizations have been striving to deal with the rising menace of cyber crime, there is dire need to develop strong anti-virus software's to ensure information security....
11 Pages (2750 words) Research Paper

Criminology: Cyber Crime

The paper "Criminology: cyber crime" states that as much as rapidly advancing computer technology assists in simplifying life activities and integrating lifestyles, it has led to the development of equal dangers and risks that were absent before the advent of computers.... Internet or network connection becomes of great use when committing a crime from a remote location (Pati).... Forms of Cybercrime As mentioned earlier, cyber crimes assume various forms and means that are all destructive to individual information systems....
10 Pages (2500 words) Research Paper

Types and Fighting of Cyber Crimes

The author of the "Types and Fighting of Cyber Crimes" paper focuses on cyber crime which is illegal activities such as credit card fraud, and software piracy, among others that are carried out over the internet to offend people's senses or even evade privacy.... Cyber crimes have created attention in various national capitals.... Unlike crime, cybercrime can easily transcend national boundaries.... Cyber crimes can be enhanced by the examination of statutes of the national government to ensure they are sufficient and able to combat any cybercrime that may be committed....
2 Pages (500 words) Research Paper

Homeland Security / Digital Crime and Digital Terrorism

This new office, located in the White House, was to oversee and coordinate a comprehensive national strategy to.... omeland All the national efforts to protect America from external and internal threats are currently included under homeland security.... The development of internet has opened one more channel for terrorism; digital crime and digital terrorism.... Generally speaking digital crime or digital terrorism is the criminal or terrorist activities performed with the help of computers and internet....
7 Pages (1750 words) Research Paper

Cyber Espionage Crime

According to research findings of the paper 'Cyber Espionage crime', the US government should establish trade links and proper relationship with countries such as Russia and China as well as other international communities.... The crime has destroyed the united state technological infrastructure whereby, exposing the government, military, and business to great risk (Bucci, Rosenzweig and Inserra, paras.... he Key elements of Cyber Espionage crime may be understood by answering a number of questions such as where does cyber espionage exist in the technological world....
5 Pages (1250 words) Report

Threat Posed by Cyber Crimes to Homeland Security

cyber crime is a major global threat in our world today.... There numerous threats that materialized while some have been neutralized making cybercrime is a major threat to economic and national security.... This form of crime takes various forms such as the illegal intrusion of networks, intentional dissemination of viruses, as well as a range of activities such as identity theft, stalking, terrorism, and bullying.... "Threat Posed by cyber Crimes to Homeland Security" paper points out an example of an incident that has recently occurred and how it is a challenge to homeland security....
6 Pages (1500 words) Coursework

Future Cyber Security Crimes

The DNA technique adopted fingerprinting aspects in order to connect the semen stain and samples that were collected from two crime scenes in Leicestershire, United Kingdom.... In the United States of America, the use of DNA profiling and fingerprints in crime came about with the invention of Kary Mullis (Scottish Government, 2016).... The crime exploited the fact that the early phone systems in the 1970s adopted acoustic control signals, which were in-built devices that were later used to fake possible signals....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us