Digital Integrity

Great Essays
DIGITAL INTEGRITY
The long-term prosperity of cyber-dependent society depends on digital integrity. Digital integrity is an absolute, non-negotiable requirement, without which the rules of law and order in a computer dependent society will fade and vanish. The growth of global trade also requires digital law and order. Digital integrity is the common denominator for prosperity and progress. It is the critical factor in a computer dependent life style. While digital integrity remains elusive, trade, prosperity and survival are all at stake. The digital computer must be trustworthy.
This is an engineering problem no different from others. The ultimate test for digital integrity will be the development of a global digital currency. This would
…show more content…
This is true in the natural world or in cyberspace. In fact, it is the problem with cyberspace. Abstraction is the basis of computers work, so fraud and forgery are basic threats. The stored programs define the digital implementations of abstract ideas. The abstraction has value and like gold must be held safe or the use of the abstraction is worthless. Paper money cannot be traded and financial instruments that are more complex cannot exist unless the foundation currency is sound. The abstract representation must always be protected from fraud and …show more content…
They both depend upon proven, daily confidence in the system. The measure of crime on a daily basis is the ultimate test of public confidence. Financial integrity and digital integrity are directly are not simply equivalent and as cyber dependency grows they are intimately linked and mutually dependent. To have one we must also have the other. To solve the problem of cybercrime the problem of pointer fraud and forgery in computers must be resolved. Unless and until instruction can be trusted nothing is safe from unexpected digital corruption.
• Pointer fraud includes the ability to corrupt memory by constructing and using an inappropriate address in a shared static address space. The address is logically out of scope but static addressing allows this error because all static addresses are equally valid.
• Forgery is the construction of a crafted static address and passing it on as a (deliberately or accidentally) corrupt value in a digital exchange. Perhaps in API call to the operating system. The unsuspecting and naïve client is fooled causing further

Related Documents

  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe? ` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    V-Care Security Solutions

    • 150 Words
    • 1 Pages

    V-Care Security Solutions We live in a society with a perceived threat from numerous sources. These threats are now a reality that faces us on a daily basis. We are put through metal detectors as we enter airports, multiplex or malls. Our society must be shielded from planned and random incidents that threaten to throw our fast pace of life out of gear.…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The internet has allowed for many great advances in data storage and availability, but these positive aspects are checked by the negative ones, namely, how easily lies are spread and…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Digital Evidence

    • 640 Words
    • 3 Pages

    A big concern around the collection and analysis of digital evidence is when an executed search warrant becomes a general warrant. Digital evidence is scattered within a computer surround by data that is considered to be protected documents. Because of this fact digital evidence collection and analysis can turn a warrant into a general warrant. This is a major problem for law enforcement because it means that whole cases could be thrown out, or criminals could end up back on the street. Many people have tried to determine what the best course of action is to try and avoid general warrants with computers.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Digital Forensics Essay

    • 544 Words
    • 3 Pages

    This phenomenal technology cloud computing has expeditiously evolved in the field of Information Technology. Cloud Service Providers (CPS) have brought diverse transformation changes in cloud computing. This technology has formed new opportunities /haven for criminal activities. The paper has used a descriptive literature review to determine issues that are at present affecting digital investigations. There are several issues that influence the preservation, acquisition and data acquisition of evidence in the cloud environment.…

    • 544 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    White Collar Crime Paper

    • 1009 Words
    • 5 Pages

    The future has many aspects in store in term of white-collar crimes. The first characteristic of white-collar crime the future has in store is that if it continues to cost the United States billions of dollars each year, the U.S. justice department will develop new ideas and techniques to combat it. The second aspect the future also has is that Wall Street top executives will be held responsible for crimes committing within their corporation with or without their prior knowledge in the future because that is what politicians are now pushing for. For example, Hillary Clinton, when she was running for the 2016 presidential election, she proposed that if she becomes president, she would make sure that Wall Street top executives be held responsible for crimes committed within their organization. Similarly, with Elizabeth Warren, in the Wells Fargo scandal she is also talked about how corporate top executives should be held responsible.…

    • 1009 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The most serious threat to the United States of America is not a physical terrorist attack, but rather a cyber-related one. In Washington, D.C., you can probably count on one hand the issues that both Republicans and Democrats can agree on – and this is certainly one of them. The inevitability of such a catastrophic event and the destruction that it could cause is a nightmarish scenario that without a doubt keeps our elected officials and military leaders awake at night. The questions aren’t “if,” but “when?” Imagine life for one day, or even one hour without computers or the internet.…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In recent years, Cyber-attacks have become a more common form of terrorism used against the United States. Cyber-terrorist have the ability to access bank accounts, shut down systems, and send malicious viruses to ordinary citizens from the comfort of their home. It may be possible for terrorist to hack into States and Federal systems, which would be catastrophic on a global level; cyber-attacks are happening more and more often than they should. This type of cybercriminals has cost the US 580,000 jobs and $100 billion, with the global cost as much as $400 billion (2013). The legal field have been targeted by cybercriminals, the sensitive data about their clients have created a gold mine for the cybercriminals, and in an effort…

    • 1394 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Integrity Analysis

    • 451 Words
    • 2 Pages

    A well-rounded student shows integrity, service, and growth in their academic lives, as well as their personal lives. I believe that I exemplify integrity personally and academically. When I think of my own personal integrity, I consider how my parents would want me to portray myself. The way I show integrity personally is just by being real. I don’t like lying, being two-faced, or ignoring people.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In today’s capitalist society money holds an important place in the web of meaning of society. Money is a homogenizing factor that unites a culture and unifies them as one (Sahlins, 1976). There are many forms of money, it comes in all shapes and forms but as society becomes more global money has undergone an evolution. Money has evolved from special purpose to a more general-purpose form, which can be traded across boarders and for a variety of goods and services at an established value. Special purpose money as a result has began to disappear as the use of general-purpose money becomes more necessary to obtain goods from the developing global market, in specific reference to the increasing popularity of the capitalist market.…

    • 1665 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays

Related Topics