Cyber Security Issues Essay

Improved Essays
The internet’s expansion since its first communication between two computers back in 1969 has created many new opportunities for people across the globe. Modern day life relies on the usage of the internet, where it improves the lives of people by making it easier to communicate, speed up their work, and share with others. However, with great things comes great consequences. Although the internet helps expand people’s lives and experiences, how are they to protect such precious treasures? Back in 1989 Robert Morris created one of the first computer worms to spread; which in turn caused much of the internet to shut down. This first cyber security attack, along with many others, paved the way for cybersecurity defense today as we know it. Cybersecurity …show more content…
While cyber security does take part in Internet safety, a more important factor is maintaining censorship. Due to a lack of censoring, illegal trafficking has found a new platform in the cyber world. The Internet gives access to various forms of medias and sites, yet some of these are used in a negative impactful manner. Illegal traffickers take advantage of the opportunities the cyber world offers in order to profit for themselves.
To begin with, various drug traffickers use social medias as a platform to advertise their selling of drugs through anonymity since censoring on medias is often lax. Take for example Silk Road which, “thrived on its anonymity” (Dragani, Rachelle). This group managed to operate for two and a half years gaining about one point two U.S. Dollars in sales and around eighty million dollars in commissions as stated by Rachelle Dragani from Ecommerce Times. Those who used Silk Road were able to “reportedly buy and sell illegal drugs including heroin, LSD, prescription pills, ecstasy and cocaine” (Dragani, Rachelle). By buying illegal drugs without the proper dosage online, overdoses could increase and cause more reckless addictive behavior. As a result of online drug trafficking, the drugs can be purchased from one place, shipped from a different continent, and then delivered to the located pick

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    But not drug and human trafficking is not the only place where innovation is taking place. The new wild west of the world is the Internet. Vast and populated by nearly every person in the world, the Internet allows people to become and do more then ever before. With this kind of playground there are people who use it to do wrong. It’s become a regular thing on the news of a large company being hacked and having customer information stolen and getting away clean.…

    • 2427 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The ability of the homeland security system to assess and respond to future threats can at times be uncertain. This is due to the ever evolving nature of the threats posed to the country. As new threats are addressed more is learned about resources are needed for each type of manmade or natural event. Since, September 11, 2001 many steps have been taken to address this country’s vulnerability to terrorist attacks and Hurricane Katrina demonstrated the need for improvements in the country’s ability to respond to natural or mass casualty disasters. The Department of Homeland Security was created to assess these threats and establish procedures to improve the resiliency of the country.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Obedience In America

    • 1095 Words
    • 5 Pages

    Is Obedience a problem for America? I have read the articles and watched the videos about statism, saying that Americans are basically a herd of cattle following along doing what they are told, and not questioning whether this is the right thing to do. Laws which in this article basically add up to rules put in place by our forefathers. Not questioning if we are truly free.…

    • 1095 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Her “employer” lured her to a hotel room where a stranger forced her to have sex with him. The “employer” became her pimp. She was lucky because her client was an Illinois police officer who rescued her from the sex trafficking industry. The female from Illinois is among the very few victims that can see a happy ending to her story; unfortunately, there are many girls out there who do not share the same story ending and are still trapped in their pimps’ clutches. It is highly likely that the pimp is not in the same place as the victim during the transaction, hence, law enforcers may be able to only rescue victims rather than getting to the root of the problem, which is the traffickers.…

    • 2069 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The education that is required to become an Information Security Analyst is a Bachelor’s degree in computer science, or a related field, also a MBA is preferred, in business management. The salary is about 86,000$ a year on the median, or about 41.43$ an hour. One the job responsibilities are the fact that you must monitor the network to make sure that there is no data breaches, know how to use firewalls, and encryption. Do penetration testing which is basically testing a network for vulnerabilities, and how to patch the vulnerabilities that occur in the network, and also knowing current security issues and how to address them. Being analytical is important, also detail oriented, ingenuity, and problem solving skills is an extremely important…

    • 765 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Drug Trafficking Essay

    • 1201 Words
    • 5 Pages

    There are 200 million illicit drug users worldwide and that number continues to grow everyday. Depending on where you are in the world, drug trafficking can be the result of a myriad of different things. From minimal border regulation to the increasing supply and demand of drugs, narcotics are prevalent everywhere. Drug trafficking has made an enormous…

    • 1201 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    [W]e live in a society exquisitely dependent on science and technology, in which hardly anyone knows anything about science and technology. The convergence of computer networks and telecommunications facilitated by the digital technologies has given birth to a common space called ‘cyberspace’. This cyberspace has become a platform for major human activities which converge on the Internet 21st Century . The cyberspace has, in fact, become the most happening place today.…

    • 835 Words
    • 4 Pages
    Improved Essays