Social Security Threats

Improved Essays
Introduction
As time passes, technology continue to evolve, become more advanced and easier to use and people also become more knowledgeable about technology. But this also create a huge problem such as hackers, people who do not respect the privacy of others. This was demonstrated when thousands of personal records from normal users was exposed online. This could be preventing if the system was tested carefully, which is what happened to Samsung newest smartphone when thousands of people reported the phone was busted into fire.
Issue 1
Source
In fiscal year 2013, United States Computer Emergency Readiness Team (US-CERT) received a notification listed cyber incidents from major agencies and it was found that these major agencies did not consistently
…show more content…
While some incidents can be resolved quickly and at minimal cost; however, with the number of cyber incidents reported by federal agencies kept on increasing, not all incidents may be accounted for and many may go unresolved and incur exorbitant costs. Here is one of the examples reported in June 2014 show how broad ineffective cyber protection can affect: “In June 2014, the Office of Personnel Management announced that personal information, including Social Security numbers, belonging to 22 million federal employees and others had been hacked,” according to …show more content…
Since the recall, Samsung had offered to everyone who currently owned a Note 7 with a replacement phones. However, many reports suggested that even the new replacement phones could not avoid the original serious problem. The following is a sample of people that had reported the incident: “A replacement phone caught fire aboard a Southwest airlines flight on Oct 5. And on Oct. 7, a woman in Taiwan suffered a scare of her own while walking her dog in a local park when she heard a bang from her jeans pocket. She discovered that her Galaxy Note 7 was emitting smoke. She claims to have replaced her original Samsung device on Sept. 27.”

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Developing data analytics to monitor and screen cybersecurity threats and react to threat attacker episodes and review log activities (Bergquist, 2016). Technical recommendations to boost security without significantly increasing personnel management can be achieved by incorporating security frameworks reviews, examining any area(s) of weakness or vulnerabilities and implementing security controls. Business partners of ABC Healthcare such as banks, vendors, and collection agencies will continue to thrive with the integration of proper security measures without introducing significant overhead and complexity. Integrating data sharing polices can protect the information and ultimately reduce the level of access to individuals information. To tackle information security infringements, ABC healthcare business partners must concentration on the collaboration of security control with ABC Healthcare to enforce security regulations such as data encryption, data sharing and disposal policies, and educate personnel by…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction When determining what/how to share information between the private and public entities (federal, state, or local governments) it is necessary to identify what the laws and regulations apply. Some of the laws/regulations depend on which portion of government is attempting to share information. If the Federal government is attempting to share information then they must identify rules such as the Federal Guidance on the Cybersecurity Information Sharing Act of 2015 which encouraged information sharing and adding liability insurance to protect the private partners (Weiss, 2016). When it comes to the state governments sharing information it is necessary for them to not only identify the laws/regulations that the federal government has in place, but must also identify the state specific laws that apply.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    CISA Cost-Benefit Analysis

    • 1058 Words
    • 5 Pages

    The CISA is the Computer/Cybersecurity Information Sharing Act that would give government agencies the right to share cybersecurity threats with the public. The CISA bill requires the Director of National Intelligence and the Departments of Homeland Security (DHS), Defense, and Justice to develop procedures to share cybersecurity threat information with private entities, nonfederal government agencies, state, tribal, and local governments, the public, and entities under threats to detect, prevent, or mitigate cybersecurity threats or security vulnerabilities. Private entities may monitor and operate defensive measures on: (1) their own information systems; and (2) with written consent, the information systems of other private or government…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    The office secures non military personnel and government PC frameworks, secure data frameworks for basic foundation, and dissect and lessen digital dangers. Encouraging reaction to digital episodes is basic to ensure our frameworks are protected. There are frameworks we use to encourage our destinations. The National Cybersecurity Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), National Cybersecurity and Communications Reconciliation Center (NCCIC), and the Federal Information Security Management Act (FISMA) Reporting guarantees that we ensure our the internet (Securing and Managing Our Borders…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Millions of Americans depend on the Department of Homeland Security to protect their information including addresses, phone numbers, and other online information that is stored on the DHS’s network. Although cyber attacks can happen at any time, the Department of Homeland Security has many agencies to stop these attacks. The National Cybersecurity and Communications Integration Center (NCCIC) is one of the many agencies that works to stop and address cyber attacks. It is a 24/7 cyber awareness management center. It addresses threats and other incidents affecting our cyber infrastructure to the public to warn citizens about keeping their information…

    • 883 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Rachel Lowry writes in her essay “Straddling Online and Offline Profiles, Millennials Search for Identity” that according to a recent online study, one out of four Millennials say they can only be their true self when alone (p. 500). But in this modern age of social media and smartphones, are we ever truly alone? Everyone can be connected with people all over the world in a second, and everyone can easily find out information about whoever they want with a simple Google search. Consequently, even if someone shuts off their computer and phone, any personal information they've posted about themselves is still out there for anyone to find. In addition to people constantly sharing aspects of their daily lives on social media, monitoring apps and…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Challenges of the Social Security Program and Possible Reforms Social Security has long been a cornerstone of the American life. However, in the more recent years, there have been problems arising with the funding of the social security, with the Social Security Trust Fund to be completely depleted by 2033, and the number of Baby Boomers far outweighing the number of Generation X’ers and Millennials alike. So what are some challenges facing America’s Social Security program today and what can our government do to reform social security? There are many different options, but I will be discussing three important ones and discussing the problems facing the social security program at the current moment. Ronald Reagan hiked up taxes for the Social…

    • 388 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Social Security was designed to provide financial help to Americans in need. It provided monthly payments to America’s older citizens, money to help the unemployed survive while they searched for jobs, and aided other Americans needed assistance. Roosevelt believed that the government was responsible for the financial health of American citizens. The economic security of the people of the United States was very important. This program was funded by the tax dollars of employers and their employees rather than straight from the government.…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Social Security Impact

    • 1447 Words
    • 6 Pages

    Tran 1 Social Security’s Impact Have you ever needed a helping hand whether it was emotionally, physically, or financially? That is one of the things that Social Security has done for people. It helps people financially by providing them a stream of income they had lost due to retirement, disability, or death. It helps them live a much easier life and provides an feeling of economic security. Social security impacts the economy positively by giving back to businesses and helping the economy grow.…

    • 1447 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    TASK 2 – DISCUSSION ON DATABASE TECHNOLOGIES a) Critically discuss the benefits of the following database technologies • Data Mining • Data Warehousing What is Data mining? According to (Jiawei Han, 2011) “We living in a world where vast amount of data are collected daily.…

    • 1694 Words
    • 7 Pages
    Improved Essays