SlideShare a Scribd company logo
1 of 9
Download to read offline
1
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Essay writing | Online Assignment help | Homework help service
www.studentsassignmenthelp.com
Email: info@StudentsAssignmentHelp.com
2
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Cyber Security Issues- Part A
3
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
In existing period of time, the use and role of internet has become extended in the most
intensive manner. In the context of exchange of information, the significance of internet has
reached to an optimum level. On one hand, where internet has provided some intensive amount
of benefits to the human beings, on the other hand, some critical issues related with security and
cyber crime has also been emerged quite significantly. Due to misuse of internet, it has become
of the most critical threats for the international peace and security1. The first and foremost
example of evilness of the internet can be revealed in the example of Wikileaks, which has
presented some critical to National Security. Wikileaks is one of the most talked website in
recent period of time, which engages in the activities of publishing and leaking some confidential
information publicly. The website came into limelight when it published some highly
confidential and sensitive information regarding national defense and security of the USA2.
President Obama has also expressed his concern about the national security after the Wikileaks
issues. The founder of the website, Mr. Julian Assange has been alleged as one of the most
wanted criminals of the country. This issue of Wikileaks has made the debate more rigorous
regarding usefulness of internet in storing, disseminating and exchanging highly sensitive and
confidential information. Information leaked by Wikileaks was quite sensitive regarding the
sovereignty and political image of the country among the rest of the world. Moreover from the
1
Keith Darrell. Issues in Internet Law: Society, Technology, and the Law (Amber Book
Company LLC, 2012).
2
Oren Dorell and Jack Gillum. Pro-WikiLeaks cyberattacks show growing threat. (Dec 2012).
USA today < http://usatoday30.usatoday.com/news/world/2010-12-09-1Awikileaks09_ST_N.htm>
4
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
perspective of the strategic formulation also the leakage of confidential information can be
proved harmful for the government3.
Although, internet has made the information technologies more advanced and useful for
human beings, yet people have started to misuse internet application for evil purposes. Hacking
of confidential and personal information of others, frauds, cyber crime related to e-commerce,
and misuse of information retrieved from internet are some of the critical issues related to
enhancement of internet usage among common people. These issues can be considered quite
harmful as it leads to harm the sustainability and security of a nation. Increasing rate of cyber
crime like frauds and hacking is the matter of concern for the government of the country. In
existing period of time, a large portion of internet users consists of young generation. Enticing
this generation by offering fake pleasure or advantages is quite easy. On the internet, where there
is virtual interaction between two people, tempting young and immature generation becomes
quite easy. Cyber criminals take advantage of this phenomena and cheat innocent people quite
easily. This is one of most critical issues associated with the use of internet4.
Moreover in existing period of time, e-commerce has become quite popular among users
for undertaking different type of financial transactions. The use of internet has made the payment
of bills and other financial transactions quite easy and hassle free. However, along with increased
3
Scott Ludlam. Department of Prime Minister and Cabinet on internet filtering, Wikileaks and
cybersecurity. (May 2013) < http://scott-ludlam.greensmps.org.au/content/estimates/department-
prime-minister-and-cabinet-internet-filtering-wikileaks-and-cybersecuri>
4
John D. Haynes. Internet Management Issues: A Global Perspective (Idea Group Inc (IGI),
2002).
5
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
use of internet for financial transaction, the number of cyber crimes in terms of financial frauds
has also been increased significantly. Cyber criminals hack confidential and personal information
regarding bank accounts of the user and conduct financial frauds. Such frauds are commenced in
so professional manner that spotting of such crimes becomes quite hard for victim. In this way,
internet has made financial forgery and frauds so easy for professional criminal5.
Along with criminals, internet is widely used by countries for spying activities of other countries.
In existing period of time, where internet has become prominent aspect of communication and
information sharing, the definition of spying and war has been changed. Nowadays cyber
security has emerged as one of the most prominent tasks for the government as now instead of
battle field, wars are taken place on internet. Internet is widely used by country to hack
confidential, sensitive and defense related information of the rival country. However, such type
of cyber spying is not right from ethical point of view and not in the alignment with legal
guidelines of international society. From the perspective of international peace and development,
this cyber spying can be proved quite dangerous6.
5 B. G. Kutais. Internet Policies and Issues. (Nova Publishers, 2002).
6
NSA Speaks Out on WikiLeaks, Cybersecurity. (December 2010). Reuters <
http://www.foxnews.com/tech/2010/12/17/nsa-speaks-wikileaks/>
6
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
In addition to this, another evil from the internet can be judged in terms of social and
moral degradation of the society. Internet has become one of the major sources of pornography
and other objectionable materials. One can easily find such objectionable material on the
internet. Teenagers and children are the easy victims of such kind of objectionable material on
different websites. Although, governments of different countries have made some significant
efforts for reducing the number of availability of such objectionable material on the internet, yet
still it is not easy to keep internet free from this issue. From the perspective of social and moral
development of young generation this scenario is not favorable as it directly harms the
sustainability of the society as a whole7.
Another misuse of Internet is done by terrorists for terrifying, and enticing people for
fulfilling their evil aims and purposes. Along with sneaking into the security system of a country,
terrorists uses internet for threatening mass people. Through internet they can easily broadcast
their views, speeches, warnings and videos across the world, which can be access quite easily by
common people. With the help of such type of actions terrorists can be proved successful in
preparing the environment of political anxiety, and tension at international level, which is one of
the major objectives of terrorism8.
On the basis of discussion made in the paper, it can be observed that there are some of the
crucial aspects related to the usage of internet which can be misused by cyber criminal in
conducting various criminal activities. Although internet has enhanced connectivity among
7 B. G. Kutais. Internet Policies and Issues. (Nova Publishers, 2002).
8
Keith Darrell. Issues in Internet Law: Society, Technology, and the Law (Amber Book
Company LLC, 2012).
7
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
people and exchange of information among them, yet information security can be regarded as
one of the critical issues associated with excessive usage of internet. Recent cases of leaking of
confidential information related with national security of the USA by Wikileaks can be
considered quite concerning regarding evil usage of internet.
8
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
References:
Oren Dorell and Jack Gillum. Pro-WikiLeaks cyberattacks show growing threat. (Dec 2012).
USA today < http://usatoday30.usatoday.com/news/world/2010-12-09-
1Awikileaks09_ST_N.htm>
Scott Ludlam. Department of Prime Minister and Cabinet on internet filtering, Wikileaks and
cybersecurity. (May 2013) < http://scott-
ludlam.greensmps.org.au/content/estimates/department-prime-minister-and-cabinet-internet-
filtering-wikileaks-and-cybersecuri>
NSA Speaks Out on WikiLeaks, Cybersecurity. (December 2010). Reuters <
http://www.foxnews.com/tech/2010/12/17/nsa-speaks-wikileaks/>
Keith Darrell. Issues in Internet Law: Society, Technology, and the Law (Amber Book Company
LLC, 2012).
B. G. Kutais. Internet Policies and Issues. (Nova Publishers, 2002).
John D. Haynes. Internet Management Issues: A Global Perspective (Idea Group Inc (IGI),
2002).
9
www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US |
Australia|Singapore
Essay writing | Online Assignment help | Homework help service
www.studentsassignmenthelp.com
Email: info@StudentsAssignmentHelp.com

More Related Content

What's hot

Proliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsProliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsDaniel Davey
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write upvictoriahoo
 
Proliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsProliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsDaniel Davey
 
Visitors and Residents: What motivates engagement with the digital informati...
Visitors and Residents: What motivates engagement with the digital informati...Visitors and Residents: What motivates engagement with the digital informati...
Visitors and Residents: What motivates engagement with the digital informati...Ben Showers
 
Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014IGF Indonesia
 
Internet
InternetInternet
InternetMax Rev
 
Using The Internet In Education
Using The Internet In EducationUsing The Internet In Education
Using The Internet In EducationEwa Nawrot
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)Alexander Decker
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacymjsale781
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalismvpriddle
 
The digital divide
The digital divideThe digital divide
The digital divideJoshNeves
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
Internet usage by the teachers working in higher secondary
Internet usage by the teachers working in higher secondaryInternet usage by the teachers working in higher secondary
Internet usage by the teachers working in higher secondaryAlexander Decker
 
Impact of internet in day to day life
Impact of internet in day to day lifeImpact of internet in day to day life
Impact of internet in day to day lifeVidhyalakshmi K
 
Internet usage in Academic Colleges
Internet usage in Academic Colleges Internet usage in Academic Colleges
Internet usage in Academic Colleges Vinita Jain
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State FilterAndrew Davies
 
Going to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library ServicesGoing to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library ServicesBrian Gray
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionICT Watch
 

What's hot (20)

Proliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsProliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implications
 
The New Digital Divide
The New Digital DivideThe New Digital Divide
The New Digital Divide
 
Cyber bullying write up
Cyber bullying write upCyber bullying write up
Cyber bullying write up
 
Proliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implicationsProliferation of Online content - Contributary factors and implications
Proliferation of Online content - Contributary factors and implications
 
Visitors and Residents: What motivates engagement with the digital informati...
Visitors and Residents: What motivates engagement with the digital informati...Visitors and Residents: What motivates engagement with the digital informati...
Visitors and Residents: What motivates engagement with the digital informati...
 
Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014Resume of ID-IGF National Dialogue 2014
Resume of ID-IGF National Dialogue 2014
 
Internet
InternetInternet
Internet
 
Using The Internet In Education
Using The Internet In EducationUsing The Internet In Education
Using The Internet In Education
 
The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)The usage of internet by youngsters of gujrat city (pakistan)
The usage of internet by youngsters of gujrat city (pakistan)
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
Day 5 social justice and multiculturalism
Day 5 social justice and multiculturalismDay 5 social justice and multiculturalism
Day 5 social justice and multiculturalism
 
The digital divide
The digital divideThe digital divide
The digital divide
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Internet usage by the teachers working in higher secondary
Internet usage by the teachers working in higher secondaryInternet usage by the teachers working in higher secondary
Internet usage by the teachers working in higher secondary
 
Impact of internet in day to day life
Impact of internet in day to day lifeImpact of internet in day to day life
Impact of internet in day to day life
 
Internet usage in Academic Colleges
Internet usage in Academic Colleges Internet usage in Academic Colleges
Internet usage in Academic Colleges
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
Going to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library ServicesGoing to the Need - Virtual & Mobile Library Services
Going to the Need - Virtual & Mobile Library Services
 
Indonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online ProtectionIndonesia Internet Sehat on Child Online Protection
Indonesia Internet Sehat on Child Online Protection
 
Web Trends
Web TrendsWeb Trends
Web Trends
 

Viewers also liked

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Unit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber lawUnit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber lawGanesha Pandian
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 

Viewers also liked (6)

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Unit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber lawUnit 5 consumer protection and introduction to cyber law
Unit 5 consumer protection and introduction to cyber law
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 

Similar to Cyber security issues part a

The Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 YearsThe Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 YearsRahul Singh
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive EssayJill Lyons
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
Data SecurityData security is a major source of concern for both t.pdf
Data SecurityData security is a major source of concern for both t.pdfData SecurityData security is a major source of concern for both t.pdf
Data SecurityData security is a major source of concern for both t.pdfshahidqamar17
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safelyAlexander Decker
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-webOmbodi Gábor
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Data localization vs global internet
Data localization vs global internetData localization vs global internet
Data localization vs global internetYoonee Jeong
 
Open for business_dalberg
Open for business_dalbergOpen for business_dalberg
Open for business_dalbergVictor Gridnev
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kcCatherine Cowperthwaite
 

Similar to Cyber security issues part a (20)

Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
The Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 YearsThe Future of the Internet - The Next 30 Years
The Future of the Internet - The Next 30 Years
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
Big Data Paper
Big Data PaperBig Data Paper
Big Data Paper
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Data SecurityData security is a major source of concern for both t.pdf
Data SecurityData security is a major source of concern for both t.pdfData SecurityData security is a major source of concern for both t.pdf
Data SecurityData security is a major source of concern for both t.pdf
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Data localization vs global internet
Data localization vs global internetData localization vs global internet
Data localization vs global internet
 
Open for business_dalberg
Open for business_dalbergOpen for business_dalberg
Open for business_dalberg
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Privacy flip book assignment film 260 queensu kc
Privacy flip book assignment  film 260  queensu kcPrivacy flip book assignment  film 260  queensu kc
Privacy flip book assignment film 260 queensu kc
 

More from www.StudentsAssignmentHelp.com

Sample assignment on impact of cruise tourism in coastal areas
Sample assignment on impact of cruise tourism in coastal areas Sample assignment on impact of cruise tourism in coastal areas
Sample assignment on impact of cruise tourism in coastal areas www.StudentsAssignmentHelp.com
 
Review the effectiveness of constructed wetlands for the treatment of either ...
Review the effectiveness of constructed wetlands for the treatment of either ...Review the effectiveness of constructed wetlands for the treatment of either ...
Review the effectiveness of constructed wetlands for the treatment of either ...www.StudentsAssignmentHelp.com
 
Free sample assignment on customs regulatory compliance management
Free sample assignment on customs   regulatory compliance managementFree sample assignment on customs   regulatory compliance management
Free sample assignment on customs regulatory compliance managementwww.StudentsAssignmentHelp.com
 
Essay and homework help on sociology, race &amp; ethnic inequality
Essay and homework help on sociology, race &amp; ethnic inequalityEssay and homework help on sociology, race &amp; ethnic inequality
Essay and homework help on sociology, race &amp; ethnic inequalitywww.StudentsAssignmentHelp.com
 
Discussion forum assignment help on environmental social governance
Discussion forum assignment help on environmental social governanceDiscussion forum assignment help on environmental social governance
Discussion forum assignment help on environmental social governancewww.StudentsAssignmentHelp.com
 

More from www.StudentsAssignmentHelp.com (20)

Social responsibility and brand strength
Social responsibility and brand strengthSocial responsibility and brand strength
Social responsibility and brand strength
 
Sample assignment on impact of cruise tourism in coastal areas
Sample assignment on impact of cruise tourism in coastal areas Sample assignment on impact of cruise tourism in coastal areas
Sample assignment on impact of cruise tourism in coastal areas
 
Sample assignment on employee engagement
Sample assignment on employee engagementSample assignment on employee engagement
Sample assignment on employee engagement
 
Review the effectiveness of constructed wetlands for the treatment of either ...
Review the effectiveness of constructed wetlands for the treatment of either ...Review the effectiveness of constructed wetlands for the treatment of either ...
Review the effectiveness of constructed wetlands for the treatment of either ...
 
Report on herman street an ecommerce website
Report on  herman street an ecommerce websiteReport on  herman street an ecommerce website
Report on herman street an ecommerce website
 
Reflective essay individual
Reflective essay   individualReflective essay   individual
Reflective essay individual
 
Product development assignment help
Product development assignment helpProduct development assignment help
Product development assignment help
 
Principles of health and social practice
Principles of health and social practicePrinciples of health and social practice
Principles of health and social practice
 
Portfolio analysis (2)
Portfolio analysis (2)Portfolio analysis (2)
Portfolio analysis (2)
 
Operations management report on tesco
Operations management report on tescoOperations management report on tesco
Operations management report on tesco
 
Marketing strategy of facebook
Marketing strategy of facebookMarketing strategy of facebook
Marketing strategy of facebook
 
Marketing plan mr bean singapore
Marketing plan mr bean singaporeMarketing plan mr bean singapore
Marketing plan mr bean singapore
 
Market research report
Market research reportMarket research report
Market research report
 
Literature review assignment help
Literature review assignment helpLiterature review assignment help
Literature review assignment help
 
Free sample assignment on customs regulatory compliance management
Free sample assignment on customs   regulatory compliance managementFree sample assignment on customs   regulatory compliance management
Free sample assignment on customs regulatory compliance management
 
Essay and homework help on sociology, race &amp; ethnic inequality
Essay and homework help on sociology, race &amp; ethnic inequalityEssay and homework help on sociology, race &amp; ethnic inequality
Essay and homework help on sociology, race &amp; ethnic inequality
 
Discussion forum assignment help on environmental social governance
Discussion forum assignment help on environmental social governanceDiscussion forum assignment help on environmental social governance
Discussion forum assignment help on environmental social governance
 
Cubic transportation systems
Cubic transportation systems Cubic transportation systems
Cubic transportation systems
 
Challenges faced by the uk healthcare system
Challenges faced by the uk healthcare systemChallenges faced by the uk healthcare system
Challenges faced by the uk healthcare system
 
Case study
Case studyCase study
Case study
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

Cyber security issues part a

  • 1. 1 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Essay writing | Online Assignment help | Homework help service www.studentsassignmenthelp.com Email: info@StudentsAssignmentHelp.com
  • 2. 2 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Cyber Security Issues- Part A
  • 3. 3 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore In existing period of time, the use and role of internet has become extended in the most intensive manner. In the context of exchange of information, the significance of internet has reached to an optimum level. On one hand, where internet has provided some intensive amount of benefits to the human beings, on the other hand, some critical issues related with security and cyber crime has also been emerged quite significantly. Due to misuse of internet, it has become of the most critical threats for the international peace and security1. The first and foremost example of evilness of the internet can be revealed in the example of Wikileaks, which has presented some critical to National Security. Wikileaks is one of the most talked website in recent period of time, which engages in the activities of publishing and leaking some confidential information publicly. The website came into limelight when it published some highly confidential and sensitive information regarding national defense and security of the USA2. President Obama has also expressed his concern about the national security after the Wikileaks issues. The founder of the website, Mr. Julian Assange has been alleged as one of the most wanted criminals of the country. This issue of Wikileaks has made the debate more rigorous regarding usefulness of internet in storing, disseminating and exchanging highly sensitive and confidential information. Information leaked by Wikileaks was quite sensitive regarding the sovereignty and political image of the country among the rest of the world. Moreover from the 1 Keith Darrell. Issues in Internet Law: Society, Technology, and the Law (Amber Book Company LLC, 2012). 2 Oren Dorell and Jack Gillum. Pro-WikiLeaks cyberattacks show growing threat. (Dec 2012). USA today < http://usatoday30.usatoday.com/news/world/2010-12-09-1Awikileaks09_ST_N.htm>
  • 4. 4 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore perspective of the strategic formulation also the leakage of confidential information can be proved harmful for the government3. Although, internet has made the information technologies more advanced and useful for human beings, yet people have started to misuse internet application for evil purposes. Hacking of confidential and personal information of others, frauds, cyber crime related to e-commerce, and misuse of information retrieved from internet are some of the critical issues related to enhancement of internet usage among common people. These issues can be considered quite harmful as it leads to harm the sustainability and security of a nation. Increasing rate of cyber crime like frauds and hacking is the matter of concern for the government of the country. In existing period of time, a large portion of internet users consists of young generation. Enticing this generation by offering fake pleasure or advantages is quite easy. On the internet, where there is virtual interaction between two people, tempting young and immature generation becomes quite easy. Cyber criminals take advantage of this phenomena and cheat innocent people quite easily. This is one of most critical issues associated with the use of internet4. Moreover in existing period of time, e-commerce has become quite popular among users for undertaking different type of financial transactions. The use of internet has made the payment of bills and other financial transactions quite easy and hassle free. However, along with increased 3 Scott Ludlam. Department of Prime Minister and Cabinet on internet filtering, Wikileaks and cybersecurity. (May 2013) < http://scott-ludlam.greensmps.org.au/content/estimates/department- prime-minister-and-cabinet-internet-filtering-wikileaks-and-cybersecuri> 4 John D. Haynes. Internet Management Issues: A Global Perspective (Idea Group Inc (IGI), 2002).
  • 5. 5 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore use of internet for financial transaction, the number of cyber crimes in terms of financial frauds has also been increased significantly. Cyber criminals hack confidential and personal information regarding bank accounts of the user and conduct financial frauds. Such frauds are commenced in so professional manner that spotting of such crimes becomes quite hard for victim. In this way, internet has made financial forgery and frauds so easy for professional criminal5. Along with criminals, internet is widely used by countries for spying activities of other countries. In existing period of time, where internet has become prominent aspect of communication and information sharing, the definition of spying and war has been changed. Nowadays cyber security has emerged as one of the most prominent tasks for the government as now instead of battle field, wars are taken place on internet. Internet is widely used by country to hack confidential, sensitive and defense related information of the rival country. However, such type of cyber spying is not right from ethical point of view and not in the alignment with legal guidelines of international society. From the perspective of international peace and development, this cyber spying can be proved quite dangerous6. 5 B. G. Kutais. Internet Policies and Issues. (Nova Publishers, 2002). 6 NSA Speaks Out on WikiLeaks, Cybersecurity. (December 2010). Reuters < http://www.foxnews.com/tech/2010/12/17/nsa-speaks-wikileaks/>
  • 6. 6 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore In addition to this, another evil from the internet can be judged in terms of social and moral degradation of the society. Internet has become one of the major sources of pornography and other objectionable materials. One can easily find such objectionable material on the internet. Teenagers and children are the easy victims of such kind of objectionable material on different websites. Although, governments of different countries have made some significant efforts for reducing the number of availability of such objectionable material on the internet, yet still it is not easy to keep internet free from this issue. From the perspective of social and moral development of young generation this scenario is not favorable as it directly harms the sustainability of the society as a whole7. Another misuse of Internet is done by terrorists for terrifying, and enticing people for fulfilling their evil aims and purposes. Along with sneaking into the security system of a country, terrorists uses internet for threatening mass people. Through internet they can easily broadcast their views, speeches, warnings and videos across the world, which can be access quite easily by common people. With the help of such type of actions terrorists can be proved successful in preparing the environment of political anxiety, and tension at international level, which is one of the major objectives of terrorism8. On the basis of discussion made in the paper, it can be observed that there are some of the crucial aspects related to the usage of internet which can be misused by cyber criminal in conducting various criminal activities. Although internet has enhanced connectivity among 7 B. G. Kutais. Internet Policies and Issues. (Nova Publishers, 2002). 8 Keith Darrell. Issues in Internet Law: Society, Technology, and the Law (Amber Book Company LLC, 2012).
  • 7. 7 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore people and exchange of information among them, yet information security can be regarded as one of the critical issues associated with excessive usage of internet. Recent cases of leaking of confidential information related with national security of the USA by Wikileaks can be considered quite concerning regarding evil usage of internet.
  • 8. 8 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore References: Oren Dorell and Jack Gillum. Pro-WikiLeaks cyberattacks show growing threat. (Dec 2012). USA today < http://usatoday30.usatoday.com/news/world/2010-12-09- 1Awikileaks09_ST_N.htm> Scott Ludlam. Department of Prime Minister and Cabinet on internet filtering, Wikileaks and cybersecurity. (May 2013) < http://scott- ludlam.greensmps.org.au/content/estimates/department-prime-minister-and-cabinet-internet- filtering-wikileaks-and-cybersecuri> NSA Speaks Out on WikiLeaks, Cybersecurity. (December 2010). Reuters < http://www.foxnews.com/tech/2010/12/17/nsa-speaks-wikileaks/> Keith Darrell. Issues in Internet Law: Society, Technology, and the Law (Amber Book Company LLC, 2012). B. G. Kutais. Internet Policies and Issues. (Nova Publishers, 2002). John D. Haynes. Internet Management Issues: A Global Perspective (Idea Group Inc (IGI), 2002).
  • 9. 9 www.studentsAssignmentHelp.comCustomEssayWriting –AssignmentHelpServices –UK | US | Australia|Singapore Essay writing | Online Assignment help | Homework help service www.studentsassignmenthelp.com Email: info@StudentsAssignmentHelp.com