Cybersecurity And Technology

Great Essays
Nowadays we hear the word “cybersecurity” a lot but do you ever wonder what does it really mean? According to the department of homeland security, “Cybersecurity is general Internet safety, which includes protection of anything connected to or accessible by the Internet- from networks themselves to the information stored in computers.” The University of Maryland University College defines cybersecurity as a measure that protects our computers, networks, programs and data from unintended or unauthorized access, change or destruction.” You can also think of cybersecurity as a fence that keeps others from manipulating the confidentiality, integrity or the availability of your information without your consent. In the past 25 years, technology has …show more content…
In other words, ethics is concerned with distinguishing between good and evil, between right and wrong human actions. The power that Internet provides to its users is overwhelming. The users can harness the power to do either wonders for the humanity or for its destruction. Individuals can exercise their rights of free speech more enthusiastically and at the same time, technology can control those actions by undermining the rights. The Cyberspace is so diverse that standard laws can’t be enforced. It is extremely important for employees to feel the freedom to be able to perform better. “For example, Alge et al. (2006) found that increased empowerment and extra-role behaviours were a direct result of enhanced information privacy perceptions.” If an employee feels like he is being watched all the time, he may not be able to perform at his best even if he has nothing to hide. Instead he may feel uncomfortable. Some employee even perceive the working environment hostile to their privacy. Genders play a vital role in this issue. “Moving into the world of IS professionals, Kuo et al. (2007) found that women exceeded men in regulatory self-efficacy overall and particularly in terms of whether they protected information and acquired extra information about an individual. (Kirstie Ball Elizabeth M. Daniel Chris Stride, (2012))” Protection of employees’ personal information is another issue. “Rapid advances in …show more content…
Where we are enjoying the benefits of high speed internet and the comfort to access our contents anywhere in the world, we are also potential victims to the cyber threats and attacks. Especially in last five years, cyber- attacks have increased at a phenomenal rate. This raised the need to have higher security applications that will provide better Confidentiality, Integrity and the Availability of companies’ data. To be able to protect the data and not violate privacy practices, governments need to understand the ethics around cyber security. Cybersecurity research ethics group has pointed out some challenges. These challenges are not exceptional, but increasingly the norm. For example: (i) to recognize significant Internet threats and develop effective defenses researchers infiltrate malicious botnets; (ii) to understand Internet fraud(phishing) studies researchers surreptitiously observe users in order to ascertain typical behaviors; and (iii) to empirically measure network usage and characteristics researchers require access to users’ nonpublic traffic. Governments need to create a better understanding of the cyberspace and the consequences of implementing information gathering applications that can monitor individuals’ actions without their

Related Documents

  • Superior Essays

    (Littleton) One month after the attacks of 9/11, a former national security cyber terrorism expert expressed concern about the launch of a cyber attack, which would cause confusion and panic. Most recently, the “SONY” attacks by North Korea and the hijacking of the web site ‘Ashley Madison’ by the group known as The Impact Team, was an attempt to not only destroy software or equipment, but was an act of cyber terrorism used to exploit sensitive information that could be detrimental to lives of politicians, business leaders, and thousands of others. (Ellyatt) “When a U.S. military plane crashed in Chinese territory in 2003 after computer hackers attacked American systems with viruses, the academic, Dr. Alan Ryan, warned that cyber terrorism was the way of the future and the nation’s security experts would have to focus their attention on the problem.” (Murrill) In response to the undeniable fact that cyber terrorism is a relevant and dangerous threat, President Barrack Obama bolstered cyber terrorism defense. Today a “cyber war” is taking place. Government agencies and corporations have tripled the hiring of cyber security experts, and the field is one of the fastest growing and in- demand areas of the global workforce. (UBLS) The U.S. military has created a specialized task force within U.S. Cyber Command, pulling personnel from all branches of…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    This article explores the benefits associated with the use of cybersecurity in day to day living. The authors focus on the reasons why many people are shifting their operations to involve use of cybersecurity. As used by the national presidential administrators, the authors of the article postulate that it is necessary to have national strategies for electronic security as a protection from intrusion. Further, the authors of the article claim that the integration of cybersecurity has…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65). He also adds, “Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb” (Pollit, 2007, 66). It is a haunting thought to know that terrorist attacks are taking place behind a computer screen. The fact that cyber terrorism can happen without anyone knowing gives these hackers and terrorist groups an advantage over authorities (Pollitt, 2007,…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people. The government must fulfill its constitutional duties and the people must allow it.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    I have seen a lot of things occur in my career. The one I see more and more of is cyber activities. When I entered the military I had never touched a computer with any seriousness before. I didn’t know the basis of how to use one, I remember sitting there in the office, and a Lieutenant taught me how to change the screen saver. Now, computers are a part of everyday life; we shop on them, talk on them, bank on them I could go on an on. Computers are woven in every aspect of the government, and the lives of all Americans.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    Individuals question what kind of response a 200-year-old government can provide to modern-day threats. Some believe that even if Congress had the ability to adopt a utopian cybersecurity law, it would be short lived because of the endlessly evolving nature of cyberspace. Those who support private sector cybersecurity also arguing that breaches only happen because their networks are consistently being attacked. Furthermore, economic experts believe if the government enacts legislation, many of the cybersecurity professionals would leave America to seek employment in other countries (Clinton, 1). Because of these potential political, social and economic woes, government legislation could stifle innovation and financial…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    By 2013 American society had fully embraced this revolution… and for good reason. It allowed business to create global footprints, established the concept of electronic money transfers (e-commerce), and revolutionized communication networks. However, with every advancement comes the criminal exploits of vulnerabilities. This criminal element help create the notion of “policing” cyberspace, which enviably lead to the development of new tactics and techniques to secure…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security. Amendments to the CFAA have been added over the years to address crimes which use the computer to defraud and destroy data. Legislation has been enacted to protect victims of malicious code and denial-of-service attack (Department of Justice, n.d.). The CFAA was not intended to be a catch all statute for cyber-related crimes. “Congress addressed federalism concerns in the CFAA by limiting federal jurisdiction to Prosecuting Computer Crimes cases with a compelling federal interest—i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature” (Department of Justice, n.d., p.4).…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data. Technology in the twenty first century…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    We are faced with ethical dilemmas everyday of our lives and in the forefront is the ethical dilemma of national security vs our personal privacy. Post 9/11, ethics aside, people’s greatest concern was national security and protecting the nation. They were willing to give up some civil liberties and privacy in order to have that protection. Ten years later the reverse is true. More people are questioning the government’s intrusion of their…

    • 978 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace.…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays