Download file to see previous pages...
With the development of science and technology, the possibility of cyber threat increases. Cyber criminals vary from organized group of hackers supported by various kinds of political, ethical or retaliatory motives to virtual robbery activities, inspired by financial gain. It is vital for organizations to understand the profile and mode of operations of targeted areas. According to Martin (2013), “Targeted, organized and long-term threats categorized as “advanced persistent threats” can be a significant problem due to sophisticated technology, expert attackers and potentially Nation State sponsorship” (p.1).
The main objective of this paper is to analyze the concept of cyber security in association with a recent international event. It analyses the possible threats that people may face in cyberspace. The paper seeks to answer questions related to cyber security such as: who is been harmed and by whom, what is the harm/causation, what is the broader implication of the harm and what is the major moral issue on hand. Most importantly, it will discuss how companies use such as rights theory, justice theory, an ethics of character, and an ethics of care while relating the same about the particular incident.
The concept of cyber security in modern world is important to understand cyber threat. Cyber security is developed to protect the individual users as well as companies. The term cyber threat can be defined as an outsiders attempt to hamper the normal operation of any particular system which is designed to help the normal activities of the people in a society. Cyber threats can be a great danger for the financial sector, government, and the army. In countries such as USA, the statistics associated with the cyber-crime is increasing rapidly. With the situation so alarming, the President of USA, Barack Obama forced to declare the month of
...Download file to see next pagesRead More
“Cyber warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means”. Computer networks are connected globally and it is easy for the hackers or trained computer professionals to break all the firewalls and intrude into the websites of other countries to collect secret information.
Information is a main asset for any institution and measures to ensure security of assets is of key importance. A well implemented information security governance framework should direct and control security policies that are implemented at all levels of decision making Table of Contents 1.
In the field of nursing, informatics has been introduced in order to improve efficiency. This has prompted the introduction of health information systems in healthcare. Health information systems deal with a lot of operations involved in managing sensitive medical information for different patients.
In a data-centric world, it has become a necessary competence to develop secure network systems to guaranteed information fidelity. Countries are engaging national Cyber Security policies to ensure information security as data traverses the information networks.
High intensity of network attacks has pushed organizations to invest in more secure systems that can resist external attacks and limit access of organization resources. The development of biometric technology has provided organizations with the hope of restoring security that has been undermined by skilled network attackers.
The Patriots Act allows for law enforcement agents to search private financial institutions and also communications like the e-mails and websites. The U.S government can now detain indefinitely immigrants suspected of terrorism activities. The