Sunday, June 2, 2019

Cybersecurity: Advantages and Disadvantages

Cyber auspices measure Advantages and DisadvantagesCybersecurity Friend or Foe?From 2005 to 2020, the digital universe leave alone grow by a factor of 300, from 130 exabytes to 40,000 exabytes, or 40 trillion gigabytes.1The net profit is growing at an outrageous rate, and with it so must security. Cyber gage is measures taken to shelter a computer or computer system (as on the Internet) against unauthorized access or attack(Webster). This word was start used around the family 1994. While the internet and cyber security are symbiotic, what happens if one grows faster than a nonher? Will that set fire to the internet and topple it, or make it stronger? In recent years, cybersecurity has compose a hot topic in more countries. In the U.S., cyber security is straightway a major issue and one that many people do non comprehend. Actually cyber security helps our customary lives and keeps us safe from cyber attacks. These cyber attacks could steal important instruction like cred it post-horse song or addresses even age and any other info stored on a site with no cyber security measures. The US goernment and the sequestered sphere of influence are utilizing numerous strategies to keep up with the rapid pace of progressively sophisticated cyber security threats. However, U.S. citizens are beginning to question if the governances and private sectors attempts to effectively combat cyber security is now undermining civil liberties and exceeding limits of government secrecy. In the past, present and future, cyber security has been both an ally and antagonist of the U.S. government and U.S. citizens.First we begin by rewinding to the past to see how Cyber Security has changed the Internet. The Internet originated in 1962, hatched from the brain of Paul Baran of RAND, who developed the idea of distri saveed, packet-switching networks. This was the first idea of its kind and would revolutionise the founding in years to come. With the help of Paul Baran and DARPA an agency of the United States Department of Defense In 1969 the Advanced search Projects Agency Network aka (ARPANET) goes online and is the human beingss first fully operational distributing, packet switching-network. Shortly after the rise of ARPANET, Bob Kahn and Vint Cerf both noticed the usefulness of the internet and began to ply out and develop the basic ideas of the Internet. Finally In 1974, the company BBN launched the first public packet-switched network called Telenet (X. Cringely). The civilian Internet was born in the mid-1990s as an off shoot of ARPANets military network. The Internet is bringing a revolution across with it bringing global supply of endless vital information that brings revolutionary reformed conventions and destroys old world definitions. Much time goes by and we finally see the full rise of the World Wide Web. In 1992 the build of hosts, which means computers or servers supplying information, breaks 1,000,000. By its third year the World Wide Web has a growth rate of 341,634% in service traffic. And the Internet was baptized in 1996 by holding the first World Exposition ever shown on the Web. It has now become so embedded in our everyday lives that it has radically altered the way individuals and societies interact (Kaufman). From this point on we see the birth of a new force that lead bloom into a stunning flower in later generations, yet the question remains whether this flower be a sweet smelling rose or poisonous Lilie.With the sexual climax of the Internet came the need to protect information from cosmos taken this came in the form of Cyber Security. In the beginning Cyber Security did not matter a outstanding deal because there was no real confidential data being handled on the web. It was still a comparatively new concept. Thus there was not much security other than the CIA or NSA would occasionally use the web to track down criminals individually by surveillance (McCracken). When the Internet began to intertwine with our routine lives, cyber security troubles began to occur. Large amounts of confidential information began to be stored on the Internet, and hackers began to penetrate through simple defenses to steal this minute information. In response, the NSA and CIA implemented multiple layers of Cyber Security to their servers. Following numerous cyber attacks, private sector companies also began to tackle this issue by hiring Information Technology experts capable of defend their information from hackers. As companies all over were in need of Cyber Security to keep others vital information safe, they began their search for people with the skill set they needed. This new type of job pays a cumulus because of the high demand for this technical knowledge (Lawrence). At this point cyber security basically is only showing its friendly face. The industry was adequately protecting critical information without encroaching on peoples privacy.Lastly, the need to protect informatio n became a global issue with countries committing warfare via digital frontiers and borders rather than physical ones. Cyber Security began to give divisions among countries such as China, Russia, U.S as these three countries became leaders in hacking, stealing information and digital espionage. A great example of this is in 2001 of the FB hack which raised(a) concern all over the world of for security reasons. This hack happened when the FBI went on a sting operation to retrieve small part of information without being noticed from two Russian intelligence based computers. However layers are afraid that this act may bounce back to them as they overhear perpetrate a cross-border hack many people believe that they halt done this with poor judgement (Lemos). They obtained this information from these servers without the assistance of Russia. This could mean that the U.S. can widen its borders on where it can search and capture criminals. However this also bring the law up of Whatev er we do to them, they can do to us, said Yarbrough, a reason Department of Justice cyber crime prosecutor(Lemos). Clearly this inter-country cybersecurity warfare marked the beginning of the negative results of cyber security and paved the way for increasingly complex issues in the present. directly we currently face a critical situation in which Cyber Security is becoming more of a foe than an ally. It has gotten out of control and is now forcing citizens to question whether the government and private sector are respecting their very civil liberties. With the advent of the cloud both the government and private sector store massive amounts of information outside of their physical offices, making it even more risky for cyber attacks. The enemies are able to attack just as easily from within the shaping as from without. A well known example of internal hacking was Wikileaks, in which a U.S. soldier J. Kirk Wiebe downloaded confidential embassy communications from around the world and shared them with the press. other U.S. government leak was perpetrated by Edward Snowden a famous whistleblower from within the NSA. He downloaded thousands of classified files, attacking from within the NSA , to show the world what he considered to be an overreaching of the U.S. government in citizens and other countries privacy (Riley). While the government and the private sector may be winning the battle of effectively tutelage citizens and their data safe, they are sacrificing civil liberties and privacy that has been the hallmark of our country since its founding over two hundred years ago.Now Cyber Security threats are not only pertinent to government based servers but as to the private sector as well. Companies such as Target and Sony have been widely stirred by these attacks. Target recently lost large amounts of market share due to the cyber security attack they suffered in which numerous amounts of confidential customer information was stolen. People are shying away from Target due to the general fear of having their information stolen. Sony has been attacked numerous times but has now learned from the past and is creating new security and encryption platforms to ensure customers it is safe. Every time a company is attacked, a beneficial outcome rises from the overall flaws that are exposed, allowing organizations to improve their Cyber Security. An example of this is a recent bug called Heartbleed. HeartBleed is a bug that breaks through OpenSSL to find passwords and other confidential information. It attacked what were previously considered impenetrable platforms including Yahoo, Instagram, and even Google. Weeks later all breaches were sealed and lessons were learned.Currently, the contention from both the government and private sector for the same scarce Cybersecurity professionals is resulting in a war for resources and talent, making it even more difficult for the friendlier side of cyber security to prevail. Now the government targets t hese cyberwarriors when they are still students and lures them in before they can go to a private company. How? They begin to pay scholarships, tuition, books, and a salary. Unlike many government course of studys, Cyber Corps has seen its budget triple to $45 million a year in the past three fiscal years, says Victor Piotrowski, lead program director for Cyber Corps at the National Science Foundation . Al just about four in 10 IT security positions went unfilled in 2013, according to a survey of more than 500 organizations by the Ponemon Institute, which studies privacy, data protection, and information-security policy (Lawrence). Frequently, government employees are lured away by substantially higher salaries in the private sector. An increasingly important challenge for the government in retaining skilled cyber warriors is that many employees choose to leave government employment because because they say they do not want to blemish on U.S citizens behind their backs (Lawrence). With these many challenges, cyber security currently appears to represent more of a foe than an ally. 1New challenges will surface in the future in cyber security. Just as less than 70 years ago, the world had no idea that internet was about to revolution the way we look at the world and interact, it is difficult to speculate on the direction of cyber security. However it is possible to hypothesize on the near future and what is to come. Cyber security has already begun to be a problem for mobile telephony, and it is likely to increase exponentially. Mobile phones are an enticing target as they display important information such as location, credit card accounts, secret work files and photos. More and more hackers are begging to target this growing platform. Between April and December 2012, the types of threats detected on the Google Android platform change magnitude by more than 30 times from 11,000 to 350,000, and are expected to reach one million in 2003. (Center for European P olicy Studies, CEPS)*insert end connecting almost what to thesis and future*2What began as small cyber battles among countries has now given rise to a full scale Digital World War. Now a days we see countries aggressively hack each other. The U.S. is deeply worried about China, as it has attacked its intelligence agencies multiple times. The U.S. government has prohibited Chinese hardware in US institutions such as NASA, the Department of Justice and the Department of Commerce, unless a thorough assessment of cyber-espionage or sabotage (CEPS) risk by specialised federal officials has been carried out. Furthermore, the U.S. government recently accused 5 high ranking chinese officials of cyber espionage. This unprecedented accusation has led to increased tension between the two governments with both accusing each other of espionage.Is this the end of the internet and where will we go from here? The Internet just keeps expanding and expanding and so does cyber security and its cons ecutive abuse of privacy and civil liberties. The NSA could eventually cause the downfall of the internet because they have fatally altered the perfect balance of self-expression, internet cyber security, and governance. In a recent speech that Snowden gave with techies, he stated that the NSA is setting fire to the internet, and that you are the firemen (McCracken). An additional issue that is just as important to the future of the internet and cyber security is the recent FCC decision regarding fastlane, which allows internet service providers to charge a premium for faster service for websites. A likely scenario is that large corporations with large budgets will have greater access to sharing files than small corporations or nonprofits. Some experts fear that this intrusion on free and equal access to sharing information over the internet sets a dangerous precedent that could allow organizations a great power in manipulating what information is available to world wide web users. This U.S. government policy could be the greatest enemy to the civilian internet and civil liberties than any cyber security initiative.While the internet and cyber security have existed for a relatively short period of time in human history, it has radically changed the way governments, corporations and individuals interact. In its inception, cyber security played a friendly role in protecting the limited information available on the world wide web. Currently, a darker side of cyber security, developed in the name of protecting U.S. citizens, has radically changed the U.S. governments approach to cyber protection. U.S. citizens and other governments have been shocked to learn that their phone calls and their data is all open to scrutiny by the U.S. government. People and organizations, such as Snowden and Wikileaks, have begun to fight back to reestablish the balance of civil liberties and cyber security. The future of this critical issue is yet to be written, but it is clear that cyber security hackers will become increasingly sophisticated, requiring additional intervention to ensure citizen safety. Industrialization of new viruses and digital weapons could truly change the balance of power between countries and threaten our way of living as we know. In the past, mercantilism allowed countries with the most land to maintain the greatest power, yet now this reality has taken a paradigm shift. The country with the most readily available digital warriors and resources will triumph in this new world order. Cyber security was developed to help protect law abiding citizens, but the balance has begun to dangerously tip. Many Americans believe that the civil rights, upon which our country was founded, are now severely threatened in the name of digital protection. Cyber security issues will most likely bring about a retrenching of how we share information. The global openness of the world wide web as we now know it will likely become a thing of the past as organiz ations react to the cyber security enemy and build dedicated communications platforms that deny access to the world. What the world had built as an open platform is now destroying itself from the inside out.CitationsKaufman, Micha. The Internet Revolution is the New Industrial Revolution. Forbes. Forbes Magazine, 5 Oct. 2012. Web. 30 Apr. 2014.Klimas , Liz . Connecting the Dots A Timeline of the NSA. The Blaze 3 June 2013, Technology ed. n. pag. Print.Lawrence , Dune . The U.S Government Wants 6,000 New Cyberwarriors by 2016.Bloomberg Businessweek Technology 15 Apr. 2014, Technology ed. n. pag. Print.McCracken, Harry . SXSW Edward Snowden Has No Regrets About NSA Leaks. TIME 10 Mar. 2014 n. pag. Print.Riley , Michael. Snowdens admission fee to NSAs Deepest Secrets Disputed. Bloomberg Businessweek Technology 18 July 2013, Politics Policy ed. n. pag. Print.X. Cringely , Robert . A History of the Computer. PBS. PBS, 1 Jan. 1996. Web. 30 Apr. 2014.1 http//idcdocserv.com/14141better cl osing present and tying it to the thesis and main idea of paraagraph2j

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.