This website uses cookies to ensure you have the best experience. Learn more

Security Issues In Cyberspace Essay

1325 words - 6 pages

It is held by many people today that the World seems to be a small global village because of internet and use of ICT and computers. There are many different issues and cases in Information and Communication Technology as well as in other fields that need proper analysis leading to correct decisions for solutions. Because of the brevity of the assignment, I would like to talk about security in cyberspace to deal with hacktivism and hacker ethics. Security in cyberspace or computer laboratory nowadays is risen an issue that needs solutions among computer users who always like to interact with computers. As these users come to this type of environment, they bring with them different actions or ...view middle of the document...

Unauthorized access to somebody’s data or information is in question mark by many users of computers nowadays as they interact with others by using computers. Growth of threat of cyber-terrorism is also in question mark and concern [2]. Attacks from the so called “Hackers” are on high increasing and growing graph. From the year 1988 to date, it is reported and estimated that attacks have grown so high in number [2]. The hacking act is growing day by day in great number. We then ask, what is hacking?
Hacktivism and Hacker ethical issues
Hacking is the act of cutting somebody or something with rough, heavy blows. It may mean to kick something roughly or without control. In computer science, hacking is to secretly find a way of looking at and/or changing information on somebody else’s computer system without permission. Hacking is to penetrate into somebody’s data or accounts without permission. Who then is such an actor or inter-actor behaving in such a manner? This question is answered in the following paragraph.
A computer hacker is a person who spends a lot of time using computers for a hobby, especially to look at data without permission [1]. In the same way, a computer hacker does not respect the right, privacy and confidentiality of others. Some professional computer programmers, who do the above mentioned act, are also described to be hackers [2]. A computer hacker is a cracker that does not respect neither the law nor regulation, but likes causing big problem by undermining security or stealing someone’s files. A hacker is “a malicious meddler who tries to discover sensitive information by poking around” [2]. Ethics asks question how this term “hacker” has evolved.
The term “hacker” has evolved in a manner connected to the use of computers in a wrong way of continuous cracking and penetrating others’ data without permission and as technology is advancing. The evolution of this kind is increasing due to intensive focus on a problem while revolving around a computer and considering electronic network as the only community of people to rely on [2]. It is evolving in such a way that is called to be a technique to discover others’ information; an act that is close to stealing data or information [5]. Some political movements may like it as good for them, thus they promote it as to take some precaution on their system of communication as to secure themselves.
Many people today ask about hacker ethics if they are at all correct or wrong. Significantly talking about hacker ethics, it is all about accessing to computer systems without limits and without restriction [2]. It is “the Hands-On Imperative” [2]. To me, hacker ethics can be considered as such study of getting to know answers to the behaviors or morals of those who freely try with all their means to have access to data or information of others without permission....

Find Another Essay On Security Issues in Cyberspace

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages to $100 billion as yearly losses due to computer hackers. These losses are increasing on a basis equivalent to the number of computers logged on to networks, which is almost an exponential growth rate. The seriousness of cybercrimes also increases as the dependancy on computers becomes greater and greater.Crimes in cyberspace are becoming more and more popular for several reason. The first being that computers are become more and more accessible

A Critical Analysis of the Key National Security Issues Faced in the Post-Vietnam War Period

630 words - 3 pages A Critical Analysis of the Key National Security Issues Faced in the Post-Vietnam War Period There have been a lot of developments that happened during the Vietnam War that concerns the key national security issues of the country. However, there are an also a lot of significant changes that occurred after that historical event, that forever changed the policy conceptualization and implementation of national and foreign-related issues. The

Cyberspace in Perspective. deals with the moral issues involved with the World Wide Web. Concerns for parents, children and advertisers on the Net

1948 words - 8 pages 1.If a survey were being done on how people experience cyberspace, one would immediately notice that no two answers would be the same. Experiencing cyberspace is something that is different for every individual. I myself experience cyberspace psychologically, I experience it in my mind. There have been many attempts at trying to define the abstruse term, but up to date, no one has pinned the tail on the donkey. There cannot be one solid

Examples of War in Cyberspace

2881 words - 12 pages deceive the enemy. Bibliography Andrew Rathwell 2002 Information warfare and sub state actors, an organisation approach Cybercrime 2002 Law enforcement, security and surveillance in the information age Edited by Douglas Thomas and Brian Loader Routledge Internet sites 1. Excerpted from Cyber War Is

technology and security in africa

661 words - 3 pages the country used sophisticated weaponry to perform atrocities without detection by security personnel. This use of technology weakens the security organs put in place. In Africa, we particularly see technological advances in biological, chemical and cyberspace. Cyber warfare caused a revolution in Egypt, where social media played a major role in overthrowing the ruling president and regime. Technology has changed terrorism and

The World of Cyberspace and its Effects on Social Relationships

2401 words - 10 pages and whether they should be utilized and in what manner. Primary Issues Cyberspace Cyberspace is a time-dependent set of interconnected information systems and the human users that interact with these systems (Ottis & Lorents, 2010). In recent years, the term “cyberspace” has been used to explain things that pertain to any type of network system and anything to do with the use of computer technology. However, given the frequent use of cyberspace

Cyberspace: Cyber Security

1131 words - 5 pages most of the intelligence the US government has ever collected are accessible in cyberspace. Knowing this information brings me to a few questions. How well is this information protected? How does this affect the average person? This is where cyber security comes into to play. Cyber security, in a nut shell, is the attempt to stop any individual from attaining information via cyberspace that they are not supposed to have access to. Cyber

Department of Defense Strategy for Operating in Cyberspace

2042 words - 8 pages dependable cyberspace. The DOD has recognized this need and by capitalizing on its commitment to national security, has a unique opportunity to demonstrate its strength in cyberspace. The same technological advancements that have revolutionized military capabilities, have provided the DOD a unique skill set comprised of global information and communications technologies and cybersecurity expertise that offers strategic advantages in cyberspace

Military Cyber: An Evolution In Command Relationships

1693 words - 7 pages United States Cyber Command is less than four years old. The merger and stand down of the Joint Functional Component Command for Network Warfare (JFCC-NW) and the Joint task Force for Global Network Operations (JTF-GNO) formed the bulk of the new organization. 9 This new construct integrated offensive and defensive cyber capabilities in one organization resulting in efficient and effective planning and execution of cyberspace operations

History of Internet

3150 words - 13 pages business transactions will be taking place on-line in the future, crime will rise in cyberspace, and people will need to be protected. Currently the net operates mostly in an anarchic state with sysadmins and government officials patrolling the borders. There may, however, be a call for greater security on the net. Because of the existence of much proprietary and personal information on the net in the future, access to sites will be restricted

Cyberspace: The Asymmetric Battlefield of the Future

2164 words - 9 pages harmful at the governmental level. These domestic and national threats emphasize the vital importance of a secure and dependable cyberspace. The DOD has recognized this need and by capitalizing on its commitment to national security, has a unique opportunity to demonstrate its strength in cyberspace. The same technological advancements that have revolutionized military capabilities, have provided the DOD a unique skill set composed of global

Similar Essays

Rule Of Law In Cyberspace As A Means And Way To Cyber Security

1066 words - 5 pages Declaration, as follows: universality, interdependence, indivisibility, equality and non-discrimination . And now let's move on to the specific field of cyber space. It is not a secret that the USA is the main player in the cyberspace, in the syberpolicy. The main strtegy of syberspace development laid in the US initiative, called International Strategy for Cyberspace (2011). The strategy prescribes US policy principles and estimated future of the

Security And Private Issues In Ecommerce

1568 words - 7 pages SECURITY AND PRIVATE ISSUES IN ECOMMERCE INTRODUCTION: Privacy means that the control over data and security of one is the attempt to access the data by other unauthorized . These are two critical issues facing by both consumers and e-commerce sites alike. Since the invention of the World Wide Web , electronic commerce based on the Internet has grown from a simple idea into reality. Consumers browse through

Privacy And Security Issues In Data Mining

2342 words - 10 pages to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level. Informational Privacy Issues in Web-data Mining There is a debate between the benefits

Major Current Issues In It Security

867 words - 4 pages Computer technology is the most frequented topic in today’s news headlines. From e-tablets and smartphones, to internet-connected home appliances and robots, this technology has taken over our daily lives to an extent that we cannot live without them anymore. Same with all technology advancements comes other issues, which are mainly related to the security aspect of these devices and how much they do when it comes to protecting our privacy