.

Thursday, December 12, 2019

Cyberspace/Technology free essay sample

Communities worldwide connect, socialize, and organize themselves around cyberspace. International businesses for the trade of goods and services in cyberspace, move assets across the globe in a matter of seconds. Cyberspace has advanced the freedom of speech and the social networking that drives our economy. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion. As Internet usage continues to expand, cyberspace will become Increasingly woven Into the fabric of everyday life across the globe. Department of Defense, Homeland Security, depends greatly on the cyber information. It enables them to operate smoothly and quickly ATA bigger spectrum. DOD operates over 15,000 networks and seven million computing devices globally_ DOD is made to protect the freedom, privacy, and the free flow of information that we put on the cybercafà ©s. (Department Of Defense Strategy For Operating In Cyberspace, 2010). During the last decade this technology revolution has victimized the U. S. And its citizens by cybercafà ©. Identity theft is a growing epidemic and has made society undermine the confidence In the Information systems that underlie our economic and national security interests. Subjectivity threats represent one of the most errors national security, public safety, and economic challenges we face as a nation (2010 National Security Strategy). Cyber attacks are to be the third greatest threat to are nation(Department Of Defense Strategy For Operating In had serious implications for our national security, economic prosperity, and public safety. One case that was nationally known was the Corrector Bootee Teakwood Civil Action case in Connecticut which was the first of its kind. Millions of computers were infected by what is called Corridor Bootees.Perpetrators used internet providers to issue commands to, and receive stolen data from the infected amputees. The stolen data consisted primarily of Internet browsing traffic of unsuspecting users, including online banking credentials. The hackers used the stolen credentials to wire hundreds of thousands of dollars from victims, most of which were small-to medium-sized businesses and similar entities. The policy that was implemented was formed by the FBI that the stealing of additional data and blocking Corrector from updating itself. The FBI worked with Internet service providers to identify and notify the owners of the infected software.The FBI also worked with Microsoft and other software vendors, in order to make available updated anti-virus tools for removing Corrector. (u. s. Department Of Justice: United States Attorneys On Cybercafà ©, ). Statistics show that by 2017, the Cyber market is expected to skyrocket to $120. 1 billion. The estimated annual cost over global cyber crime is 100 billion. Since Backbone was developed more than 600,000 have been victims of fraud. One out ten social networks fall victim to Cyber Crime by spam email and others. (Cyber Crime Statistics And Trends , 2013). There are a few common types of Cyber attacks that victims fall pray to.One that is most common is the viruses that Trojan bring into our hardware. Fifty percent fall pray to this crime everyday. Another one is Theft of Data devices. Twenty eight percent of Americans fall pray to this crime and there personal information is stolen such as their social security, date of birth, as well as account numbers to their banks. Statistics Of Bank Fund Fraud Cases Loss And Recovery 22% were able to hold on to funds 10% were able to recover fraudulently transferred funds 68% were declared unrecoverable 37% caused loss to banks due to reimbursements 60% caused loss to businesses (Cyber Crime Statistics And Trends , 2013).There are over 556 million people per year that fall victims to cyber crime and eighteen per second. This tells me the cyber world is taken over the future of internet crimes. (Cyber Crime Statistics And Trends , 2013). Please click on the video link: http://youth. Be/discipleship I will be implementing a policy that will combine different agencies across the world to deter the War on Cyber crime. My policy will include law enforcement agencies in the U. S.. The FBI, thinned Kingdom, New Zealand Police, the Australian Police, and the Royal Canadian Mounted Police. Each of these agencies will share intelligence,I will make a proposal for a Information security research and analysis agency for advanced attackers of cybercafà ©. This proposal will be called Tableware. This team will create interest in detecting computer viral hackers and Trojan breaches. They will gather intelligence, respond to information security alerts, and break the kill chain or cyber-attack process. Tableware can help at every step including the following: Global threat intelligence from our Counter Threat Unit (CUT) about emerging cyber threats against your organization. Threat hunting services to mine deep within the environment for threat indicators .Active incident responders contain the advanced threat and break the kill chain. Support special initiatives directed at fraud involving large-scale victimizing. Each local, state, and federal agencies will be provided with this program to help fight cybercafà ©s. Also it will form an infrastructure with with the private industry and the public to expand the information flow to better educate, train, and other solutions to respond, prevent, and protect against terrorist attacks and natural disasters. It will also enhance the risk management capabilities which is a key to sectional security.With the help of the FBI, banks will be able to identify fraudulent accounts from other countries. Keeping within the legal boudoirs, we can have a greater flow of information which will result in the improved protection of the infrastructure of the U. S.. Reinforcing existing structures of the system will help promote domestic laws that could help the government contribute effectively and efficiently to the development and enforcement of global, international rule of law and ensure full compliance. References: Department of Defense Strategy for operating in cyberspace. 2010).

No comments:

Post a Comment