Nobody downloaded yet

The Cybersecurity Act A free internet no more - Essay Example

Comments (0) Cite this document
Summary
Internet can be defined as an electronic network that links information and people in different locations through the use of computers and other digital devices. The internet allows for communication between different people, information retrieval, searching for information as well as a valuable educative tool for all age groups…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
The Cybersecurity Act A free internet no more
Read TextPreview

Extract of sample "The Cybersecurity Act A free internet no more"

Download file to see previous pages The internet is a vital tool in shaping the society. Digital technology is rapidly evolving and faster data transfer rate as well as internet connectivity using the mobile phone and the other devices have opened up the communication field with huge impact to the social changes. The internet is an imperative tool in promoting social changes and bringing about interaction that can help different cultures mingle. The internet has also be blamed for a demoralizing the society by fostering violence, encouraging the influx of phonographic materials, sex exploitation, illegal trade, encouraging children to sex, promotion of immoral behavior and other numerous social ills.
This study focuses on censorship of the internet as a means of guarding the degradation of social values and norms and also as a means of fostering social interactions and shaping the society in a positive manner. Bell (1997) investigated the social impact of the digital communication and determined that the use of such devices would have both positive and negative effects. Castells (1996) argues that, the digital communications provide the material basis for pervasive expansion. Castells adds that, the internet will result to the formation of "a networking form of organization."
Internet censorship refers to the act of withholding or controlling access to some information from the information superhighway or the internet. Filters and censorware are used towards this end. Though censorship seems to block information, it has been hailed by parents and governments as vital in protecting the social norms of young children as well as preventing explicit information that may taint the cultural lifestyle of a country or encourage young children to sex. Censorship may however be abused by nations and different companies and organization to archive a selfish goal. Evil political regimes also censor internet information with a view of hampering information flow, democracy and political pressure groups views.
2.0 Information censorship
Though censorship has been used as a method of preventing young children or some members of a given culture from accessing information that may harm their religious, social and cultural norms, it has been used as a tool for discrimination. Information availed on the web is widely discriminatory. This papers studies internet information with a view of identifying the positive aspects of censorship and expose the wrongs of information discrimination at the other end.
2.1 Inequality of information ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Cybersecurity Act A free internet no more Essay”, n.d.)
The Cybersecurity Act A free internet no more Essay. Retrieved from https://studentshare.org/miscellaneous/1528569-the-cybersecurity-act-a-free-internet-no-more
(The Cybersecurity Act A Free Internet No More Essay)
The Cybersecurity Act A Free Internet No More Essay. https://studentshare.org/miscellaneous/1528569-the-cybersecurity-act-a-free-internet-no-more.
“The Cybersecurity Act A Free Internet No More Essay”, n.d. https://studentshare.org/miscellaneous/1528569-the-cybersecurity-act-a-free-internet-no-more.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Cybersecurity Act A free internet no more

Cybersecurity

...application client. A person named Philip Zimmermann received a huge private threat in developing PGP as well as enabling its accessibility to the people across the globe beside the powerful needs of the United States Government. However, PGP History started with the invention of this algorithm by the Philip Zimmermann during the year 1991. Zimmermann, working rapidly to hit the rules and regulations, developed the Pretty Good Privacy (PGP) encryptions system formed on the basis of RSA public-key security management and cryptography algorithm. After that Zimmermann presented a PGP version 1.0 as free of cost software. After that Kelly Goen provided the PGP application against a number of bulletin board applications, plus...
5 Pages(1250 words)Essay

Cybersecurity

...actively have security measures in place for traditional crimes, the relative ignorance of cyber-crimes has created a more lax environment. Indeed, a recent report by Verizon indicated that close to 90% of cyber-attacks in the last year could have been avoided if the businesses had taken proper preventative precautions. The punishment for committing cybercrime is already significant. In this way one considers that illegally accessing a network can result in between 5 months to 5 years of imprisonment ("Real cost of," 2011). In other instances it seems that cybercrime is not taken as seriously as traditional crime. One considers that Jeffrey Lee Parson created an Internet virus that caused significant...
3 Pages(750 words)Coursework

Cybersecurity

...from the Internet, internal networks, and/or other public systems as well as private systems (Schaeffer, Chan, Chan, & Ogulnick, 2009). Mobile computing can be defined as a notion which relates to displaying, collecting along with transferring data from a mobile based device to any information system by utilizing a particular or a combination of varied data transfer methods. Portability is regarded as a key facet of mobile computing (International Association of Medical Science Educators, n.d.). This paper intends to provide a discussion about mobile computing. The discussion comprises recognizing the significant cybersecurity vulnerabilities and related threats associated with mobile computing for the...
8 Pages(2000 words)Coursework

Cybersecurity

...? Cyber security Table of Contents Table of Contents 2 Introduction 3 Brief of the Organizations and their Mission 3 Comparison and Contrast of Privacy Policies of Apple Inc., IBM and Microsoft 5 Possible Changes To The Policies For Customer Protection 8 Possible Changes to the Policies to Give More Flexibility to Use Personal Information of Customers 9 References 12 Introduction Privacy policy is fundamentally viewed to be a legal statement or a document that manages and handles precious information of a client or a customer. The privacy policies are often used in various sectors with the intention of safeguarding different valuable information or data of the clients. This particular aspect i.e. privacy policy is much...
7 Pages(1750 words)Coursework

Cybersecurity

...in the above cipher text should be an O instead. The cipher text for the quote, “The difference between stupidity and genius is that genius has its limits” should read: SD AH FO WG RA BS SR ER IV BY BS CI MQ TF NI VE TG HB SN QC NC SD TD HB SN QC DE CN IC IF OT IC. Q4. Of the three ciphers discussed (Caesar, Vigenere, Playfair), what are their relative degrees of security and why? Of the three ciphers discussed, the Caesar is the easiest cipher to break. This particular cipher may be found and used by anyone of any age; I can remember using it back in elementary school in order to pass notes in class. The Vigenere cipher is a bit stronger, requiring a more complex method of analysis in order to determine the proper code...
4 Pages(1000 words)Coursework

Cybersecurity

... Question 3 Vulnerability is a fault in a system that an attacker/hacker uses to reduce the security of the information inthe system. Microsoft XP is known to be vulnerable to several threats; some of them include the following: Microsoft windows XP do not allot adequate memory for SMTP control replies hence allowing hackers to be able to read parts of e-mail messages through the use STARTTL commands. This is known as SMTP memory allowance vulnerability. (Vetterling, 2002) Windows XP is vulnerable in HTTP services where an attacker who notices this flaw can win an absolute control of computer system and be able to manipulate the already installed programs and do any other thing to the system with full user rights. Argument... Question 3...
1 Pages(250 words)Coursework

Cybersecurity

..., cyber security plays a critical role in ensuring that the organization’s systems and data remain safe against any malicious intent. Topic 2 Software programs, particularly those that run, store and retrieve data from databases remain vulnerable to cyber attacks. Aksoy and DeNardis (2008) define viruses as malicious codes which would be embedded on legitimate programs and get activated with the execution of the program. The authors further note that viruses would propagate from a computer to another. A Trojan horse refers to the virus dissembled in a legitimate program. For example, the Melissa virus known to have been spreading through the internet and which disabled networks was spread when a user opened an infected...
1 Pages(250 words)Coursework

Cybersecurity

...Cybersecurity Your Topic 3 - Some mental health and criminal justice professionals contend that hacking is an"addiction," and causes obsessive, risk taking behavior in a manner similar to illegal narcotics - hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policymakers look towards treatment, rather than incarceration, as the disposition of hacker cases? Why or why not? The study conducted by Solmaz, Bell and Saygili (2011) is interesting. At first, after reading the article, there seems to be a dilemma between hacking as a form of addiction, which requires treatment to just simply being a criminal case. But going through further to their findings, it became clearer...
2 Pages(500 words)Coursework

Cybersecurity

.... Symmetric methods may be the most suitable for securing movie videos from unlawful viewing while kept on servers in the cloud. A sender may use a key to program a message into cipher text. The receiver may employ the identical key to decipher it. This will permit only individuals who have authorization to the movie videos to view them. (Delfs & Knebl, 2007). Question 2 Yes. The American government can employ a cloud-based model to enhance its operations. This is because applications of cloud technology do not rely on on-site staff or agency servers. A cloud-based computing model is beneficial in several ways. One, it will reduce governmental cost. Payments are made incrementally. Two, the government can save more...
2 Pages(500 words)Coursework

Cybersecurity

...Personal ment I am a highly motivated individual with an aim to transcend the boundaries of the cybernetics community. I have had experience in various areas involving Information Technology, but I believe that an individual never stops learning and thus I have endeavored to continue this process in a direction that will aid my overall ambitions. Since I was a young child, I have had a vivid interest in the workings of technology, and I found the computer to be a fascinating invention that I could not wait to explore. This fascination I admit played a large role in the path that I took in both my academic and career related journeys, and it remains a high motivation to this day. My academic objectives can be divided into two... ment I am a...
2 Pages(500 words)Personal Statement
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic The Cybersecurity Act A free internet no more for FREE!

Contact Us