StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Problem of Cyber Security in North Korea and China - Assignment Example

Cite this document
Summary
The paper presents Cyber Security as a twenty-first-century problem. It is increasing and, as a result, many companies are losing their assets. Cyber-attacks are also seen as a weapon used by states against other countries. A state is required to help in tackling the cybersecurity problem…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
The Problem of Cyber Security in North Korea and China
Read Text Preview

Extract of sample "The Problem of Cyber Security in North Korea and China"

State cyberspace, for example, is global cyberspace because Cyberspace has no borders. Computer networks make a nation cyberspace global cyberspace. An individual in one side of the world can access information on the other side of the world. This aspect that a person from one end of the world can access information from far makes cyberspace a threat to the nation, organization or individual. The fact is that cyber attackers can launch cyber-attacks in a place far from the organization they are attacking (Schiller, 2010).

It is true that cybersecurity is a challenge need to be addressed by the government. In addition, cyber-attacks have increased in the last few years prompting the government and policymakers to look for ways of mitigating the problem. Cyber-attacks require a government intervention because it is not possible for a small organization to tackle such problem. The U.S. is one among many advanced economies that have had their corporations cyber-attacked by culprits operating in other countries (Bajaj, 2012).

Some cyber-attacks is said to have been instigated by some countries. This follows a cyber-security breach that was witnessed recently by Sony Pictures Entertainment Inc. The United States government alleged that North Korea was behind the attack. Based on such case and many others that have occurred previously, it is true that the governments need to help in tackling cyber-attacks.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Problem of Cyber Security in North Korea and China Assignment, n.d.)
The Problem of Cyber Security in North Korea and China Assignment. Retrieved from https://studentshare.org/technology/1681689-cyber-security
(The Problem of Cyber Security in North Korea and China Assignment)
The Problem of Cyber Security in North Korea and China Assignment. https://studentshare.org/technology/1681689-cyber-security.
“The Problem of Cyber Security in North Korea and China Assignment”, n.d. https://studentshare.org/technology/1681689-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Problem of Cyber Security in North Korea and China

The Purpose of the International Politics

It is thus true that globalization is a threat to international security.... Globalization has also resulted in the trans-nationalization of security threats since individual states lack the capability to handle pollution.... The paper "The Purpose of the International Politics" states that globalization has made it possible for militia and organized gangs to access weapons of mass destruction that they use against their opponents....
6 Pages (1500 words) Assignment

Cyber Techniques and International Tensions

This has recently been a cause of significant tension between the United States and china with the former accusing the latter of being responsible for stealing the trade secrets of various American companies in order to use these secrets to gain economic leverage.... Cybersecurity measures tend to involve various steps, the most important of these steps being a state's understanding of the different forms of cyber attacks that it is likely to encounter.... Once it has knowledge of this, then it is its responsibility to ensure that it has put in place the best security systems that it can get its hands on....
11 Pages (2750 words) Essay

Cyber Securiy and Cloud Computing

environment is to ensure adequate cyber security for users.... It is against this background that a much pragmatic approach to cyber security is required to make the use of the internet safer in today's world.... The reason for this claim is that as news of cyber breaches continues to flood the airwaves, people become sceptical about their fate in using the complex and dynamic Web 2.... This paper ''Cyber Securiy and Cloud Computing'' tells that banks and other security agencies have also used cloud computing for backup purposes....
21 Pages (5250 words) Research Proposal

The relations between the U.S. and China

and china" touches upon the U.... and china politics.... and china are often rocky at times as a result of conflicting interests between the two world powers.... The relationship between the United States and china over the last century has been marked by a lack of understanding by the former towards the latter.... nbsp;… china's President is expected to visit the United States, and this can set the stage to resolve any existing tension between the two countries....
6 Pages (1500 words) Essay

Long-Term Implications of Future Shifts on Global Economic Security

Even though President Obama warned the Americans about the dangers of outsourcing, Obama himself knows that it is difficult for the American companies to complete their projects without seeking the assistance of the cheap labor market in India and china like countries.... It is difficult for American companies to survive in the heavily competitive global market if they fail to exploit the cheap labor markets of India and china.... In short, the productivity of the countries like India and china is going to be increased a lot in future because of the opportunities they are going to receive from the West....
10 Pages (2500 words) Research Paper

Australian National Security Policymaking Processes

hellip; According to the statement, national security in Australia is the freedom a nation has from the threat of an attack and from the attack, the maintenance of the integrity of the nation's territory, maintenance of Australia's political sovereignty, maintaining the fundamental capacity that Australia has to advance her economic prosperity, and the preservation of won freedom.... The author of the paper "Australian National security Policymaking Processes" will begin with the statement that the national security statement by Hon....
24 Pages (6000 words) Case Study

Realism, Constructivism, Critical Theory, and Geopolitics in Asia Pacific Region

Security issues are of concern with the rising number of rogue states like Brunei and north korea.... The interest of the United States in Asia has increased due to the rising of China and the security threat posed by north korea.... In this paper "Realism, Constructivism, Critical Theory, and Geopolitics in Asia Pacific Region", realism theory has been used as the best theory that explains the security situation in the Asia Pacific region.... hellip; Constructivism, realism, and critical theory have been used widely within International relations to interpreting the security status in the world system....
10 Pages (2500 words) Essay

Cyber Terrorism in International Relations

The focus of this paper is on cyber-terrorism as one of the most dangerous forms of terrorism in the present era.... "cyber terrorism" appeared after the spread of information technology, use of computers, and the Internet specifically in most life activities.... hellip; The report starts the discussion on the nature of terrorism in general and cyber terrorism in particular, where aggression, intimidation, and the threat of material or moral by using electronic means issued by states or individuals against human rights or religion....
39 Pages (9750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us