US Government Surveillance

Improved Essays
Introduction The reason for the article is to stress the importance of information security to any organization. The problem presently is that many organizations either do not have enough security or they have a lack of interest in the security measures as it pertains to their individual organization. The solution to this is that organizations must ensure they have a proper balance and remain vigilant at all times. This means remaining flexible as well as adaptable to the situation of the day. This document will examine how and what role the US government surveillance has played in the information security of tomorrow. Additionally, this report will address what individual organizations can do in this ever changing environment. Lastly, …show more content…
Quite often the answer is not as safe as one might think. Then add to that fact the condition of the US government quest for information through surveillance procedures the situation becomes that much muddled. Mikko Hypponen and others like Bob Schneier suggest we are not as secure as we believe; if we believe that what the government is doing is not intentional and with a purpose. With this being said how then can private organizations kept their digital information private when the government has an unlimited budget and resources. Once again the answer is that perhaps many organizations are fighting an uphill battle. Understanding how important information security is to the business world today this issue must be addressed. While this may appear to be like David vs Goliath there are always measures that can be done to make informational assets of the organization as safe as possible. One such measure is to understand the value of information security. That means everyone within the organization has a firm understanding that informational assets are the bloodline of the future of the organization. The second …show more content…
So, then is information security bigger than many thought. The answer appears to be “yes” it is. This is pointed out in the concept of “Big Data”. Along with this concept is the notion that any and all data is important to collect mine and analyze. This analyzed data then creates and shapes pattern, trends and norms of human behavior. Therefore, it is safe to assume that information security is a big data problem. The government understands this concept all too well and this is why they attempt to secure as much data as possible. The lasting question is do the private sector understand it as well. If they did, then they would have to acknowledged that they can’t compete will the government on a level of resources and financial status. Therefore, they would look to do so with ensuring that their data is analyzed to be relevant to their organizational objectives. If this is done correctly there the analyzation of organizational data could be used to discover what is out of the normal. This in turn could be used for the organization to be proactive instead of reactive. Organizations that get this wrong are often left with data that is simply being stored instead of analyzed for the use of proactive measures. Cybersecurity in the information age while the government is watching is indeed tricky; however, the

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy Rights: The Case Against Electronic Surveillance In response to concerns about terrorism after the attacks on September 11,2001, the government of the United States enacted new guidelines for conducting surveillance on the public. This paper will discuss the implementation of electronic surveillance as a tool to combat terrorism and will make the case against sweeping electronic surveillance of American citizens and others in this country. Various examples of increased surveillance along with decreasing privacy right will help the reader to conclude that these tactics have not reduced incidents of any type of crime, including terrorism. This paper will also discuss several types of electronic surveillance, including the collection of metadata from telephone records, which intruded on the private lives of citizens and did not increase their safety in any meaningful way.…

    • 1377 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Everybody walks around like a robot, every move and every word is being surveillanced. A totalitarian government is a political concept that citizens should be completely subject to an absolute state of authority. In 1984 many examples of the control and authority, the totalitarian government of Oceania has over it’s citizens are made very clear, and are quite alarming to the average reader. Residing in a “free” country without freedom, this is totalitarianism, this is 1984.…

    • 1550 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The NSA’s surveillance system is a big help in stopping terrorist attacks and disrupts future plans. PRISM replaced another mass Internet data mining program, the Terrorist Surveillance Program, which was launched by the US government after the 9/11 terrorist attacks but heavily criticized and considered illegal. Through PRISM, the NSA monitor and collect internet communications from internet service providers using Data Intercept Technology.…

    • 63 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    NSA Surveillance Report

    • 217 Words
    • 1 Pages

    As a brief overview, the NSA surveillance program was a secret program, code-named PRISM, which allowed the agency to gain access to end-user information stored by big-name and popular internet and social media organizations, such as Microsoft, Apple, Skype, Google, Yahoo!, AOL and Facebook. PRISM tracks user “metadata” information of photos, content of e-mails, live chat, videos, and login alerts. This program was reported to have been authorized by President George W. Bush in 2007 along with other changes to the US surveillance rules. President Barack Obama renewed the edict during his term. Rahul Sagar, assistant professor of politics at Princeton University, argues State secrecy is vital for national security, but it can also be used to…

    • 217 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    The Office of Personal Management was established by Theodore Roosevelt is considered to be the father of the cutting edge merit-based administration. Merit is a term which means the value of quality of something or someone. Merit selection ensures that selection is based only on a person's ability to perform the work. Merit selection aims to choose the best person for the job, resulting in a quality workforce. OPM's history, which started with the Civil Service Act in 1883 and formally renamed to the Civil Service Commission.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    NSA Spying On People

    • 840 Words
    • 4 Pages

    Not all websites are created equal. There are many reasons for this inconsistency in website quality, including: age of information, how often the website is updated, and the credibility of the author. For this reason finding an article using a simple google search is difficult, because you will never know if the article you are looking at is spreading misinformation, biased views, or even plagiarism. On a controversial issue such as the NSA, (National Security Agency) a government agency created to conduct surveillance on people, the issue of misinformation and bias becomes relevant in an abundance of sources checked.…

    • 840 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Do we Need Better CyberSecurity? A targeted cyber attack on government servers can cause a lot of nations secrets to be reveled which may lead to destruction of nation's foreign relations. Internet is the backbone infrastructure of todays government. Every country is developing and using Internet technology for voting ,education,security and banking .…

    • 954 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To begin, the government should not be permitted to use surveillance on its citizens because it violates the constitution. According to a series of secret court orders issued by the Foreign Intelligence Surveillance Court, “the NSA effectively granted itself unrestricted access to every American’s complete phone and Internet records, all without any independent oversight.” This means that American citizens are being violated of their right to freedom of speech guaranteed by the constitution. This goes against what the United States stands for, and is unfair to citizens. Additionally, in the article Actually, Most Countries Are Increasingly Spying on Their Citizens, the UN Says by Olga Khazan “countless other Western nations engage in similar…

    • 437 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Y2K Crisis

    • 1120 Words
    • 5 Pages

    Having an effective security system for your organization is one of the most critical issues that the government and businesses face in this new era of technology. Technology has become the pivotal point of everything; it is a part of daily lives. There was a time where your cellphone was just a phone, now it’s a portable computer that is able to monitor your movement and health status (Jones & Aiken, 2014). In a world where millions of computers are connected to the Internet and one time, there are bound to be security issues at times. When attacks happen on the government and big businesses the outcome can disrupt the world around us.…

    • 1120 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Forward: When Edward Snowden revealed that the NSA was spying on us in 2012, I expected people to be outraged. I expected a massive public backlash that would lead to reform. By and large, the public’s reaction has been underwhelming. For one reason or another, government surveillance is a topic that many people don’t know about or don’t talk about. I’ve talked to people about surveillance before, and many of them were unaware of key details about it.…

    • 1437 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Social Surveillance

    • 2149 Words
    • 9 Pages

    Surveillance is everywhere. Even if people do not notice, it is all around us. When creating my surveillance diary and analyzing the results, I noticed several differences in surveillance depending on the locations and settings that I was in. While I was at work, most of the time there was always the feeling that you were being watched, and by the information collected, it was made clear to me that it was not just a feeling. On the other hand, while being in places such as York University for school, although there is security and surveillance, the feeling of being watched was not present as much versus being at work.…

    • 2149 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Protecting ones creations or inventions is done by copyrighting. Unfortunately copyright ones creation does not stop some people or companies from trying to take ones idea and make it seem like it is their own. This essay will exploring how easy it is toe copy and share material on the internet and the effects of copyrighting, influence of the open-source movement on attitudes toward copyright, and relationship between creativity and innovation with intellectual property rights. Next we will discuss how personal and professional effects of digital surveillance versus organizational needs for information and control, such as employer monitoring of employee computer use, business monitoring of customers’ Internet behavior, government monitoring…

    • 1009 Words
    • 4 Pages
    Improved Essays