Cybersecurity And Technology

Great Essays
Nowadays we hear the word “cybersecurity” a lot but do you ever wonder what does it really mean? According to the department of homeland security, “Cybersecurity is general Internet safety, which includes protection of anything connected to or accessible by the Internet- from networks themselves to the information stored in computers.” The University of Maryland University College defines cybersecurity as a measure that protects our computers, networks, programs and data from unintended or unauthorized access, change or destruction.” You can also think of cybersecurity as a fence that keeps others from manipulating the confidentiality, integrity or the availability of your information without your consent. In the past 25 years, technology has …show more content…
In other words, ethics is concerned with distinguishing between good and evil, between right and wrong human actions. The power that Internet provides to its users is overwhelming. The users can harness the power to do either wonders for the humanity or for its destruction. Individuals can exercise their rights of free speech more enthusiastically and at the same time, technology can control those actions by undermining the rights. The Cyberspace is so diverse that standard laws can’t be enforced. It is extremely important for employees to feel the freedom to be able to perform better. “For example, Alge et al. (2006) found that increased empowerment and extra-role behaviours were a direct result of enhanced information privacy perceptions.” If an employee feels like he is being watched all the time, he may not be able to perform at his best even if he has nothing to hide. Instead he may feel uncomfortable. Some employee even perceive the working environment hostile to their privacy. Genders play a vital role in this issue. “Moving into the world of IS professionals, Kuo et al. (2007) found that women exceeded men in regulatory self-efficacy overall and particularly in terms of whether they protected information and acquired extra information about an individual. (Kirstie Ball Elizabeth M. Daniel Chris Stride, (2012))” Protection of employees’ personal information is another issue. “Rapid advances in …show more content…
Where we are enjoying the benefits of high speed internet and the comfort to access our contents anywhere in the world, we are also potential victims to the cyber threats and attacks. Especially in last five years, cyber- attacks have increased at a phenomenal rate. This raised the need to have higher security applications that will provide better Confidentiality, Integrity and the Availability of companies’ data. To be able to protect the data and not violate privacy practices, governments need to understand the ethics around cyber security. Cybersecurity research ethics group has pointed out some challenges. These challenges are not exceptional, but increasingly the norm. For example: (i) to recognize significant Internet threats and develop effective defenses researchers infiltrate malicious botnets; (ii) to understand Internet fraud(phishing) studies researchers surreptitiously observe users in order to ascertain typical behaviors; and (iii) to empirically measure network usage and characteristics researchers require access to users’ nonpublic traffic. Governments need to create a better understanding of the cyberspace and the consequences of implementing information gathering applications that can monitor individuals’ actions without their

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Hrm/300 Week 2

    • 1986 Words
    • 8 Pages

    1. In your own words, describe what privacy means and what privacy protection companies should give employees. I feel that privacy in the workplace means personal information that an individual shares with an organization is protected and will not be shared with any other individual or entity other than those who are required and have access to the information and those who have consent to view the information. In addition, privacy can refer to the degree that an employer observes and gathers facts on the activities such as various forms of communication such as telephone conversations and emails sent on work computers. Privacy protection in the workplace given to employees should include protection of their personal information.…

    • 1986 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dbq Privacy

    • 800 Words
    • 4 Pages

    Privacy should be kept intact even for sake of security. One of the main supporting arguments for security is that if an individual has nothing to hide, then they have nothing to fear. In The Accountability Matrix by David Brin, Brin highlights the fact of having tools…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Spying In 1984

    • 825 Words
    • 4 Pages

    Everything you do electronically can be tracked, saved, and manipulated, regardless of where you are. Widescale spying occurring today eerily mimics George Orwell’s 1984 in an imminent and frightening way, as average people are no longer as private as they used to be. In 1984, Winston is trapped within a totalitarian government that watches everything its residents do or say. These residents are spied on everywhere they go and are never immune to government overwatch. In the United States today, normal citizens are being watched by internet-connected devices, government big-data collection, and businesses looking for profit.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    There are numerous cases in which the boundaries of workplace privacy and workplace internet and e-mail use are pushed and pulled back…

    • 2422 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    It is noted that there is a need to enhance privacy, confidentiality and…

    • 1029 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Thesis statement: Information privacy is considered an important aspect of information sharing. With the advancement of the digital age, personal information vulnerabilities have increased. With that in mind we should have the knowledge to ensure our safety in the internet through protective measures such as encryption, authentication, and data masking, etc. I. How the internet changed privacy. A. How the end of privacy started.…

    • 269 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Implementation of policy Appropriate measures must be taken when using workstations to ensure the confidentiality, integrity, and availability of sensitive information, including protected health information (PHI). These measures must ensure that access to sensitive information is restricted to authorized users…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays