Verified Document

Securing The Electronic Transfer Securing Research Paper

Essentially, securing the electronic frontier is very critical because of the potential harms that cyber crime and fraud cause to individual, businesses and nations as a whole. One of the effective strategies that could be employed to secure the electronic frontier is the collaboration of the government with the private and public organizations. Increasing number of governments has implemented method to secure the electronic frontier without success. Since corporate organizations are more equipped to counter IT threats than the government, a collaboration of the government with organizations will be more effective.

Moreover, the international organizations such as the United Nations should also play effective roles in securing electronic frontier. The United Nation should make a law to ensure that all member nations are obliged to secure electronic transfer in their respective nations since lack of cross-border treaties for data sharing is creating havoc to corporate organizations. Essentially, some countries such as Russia and China are assisting some organizations to engage in cyber crimes, which are causing harming to corporate organizations. Thus, there is a need to adopt international treaty to govern the cyber conflict.

Some countries are beginning to implement restrictions on cyber traffic and specific IP address. Some countries have even gone to the length of banning electronic communications with foreign countries. Banning and censorship are not the ideal method of governing the electronic border since increasingly number of people and corporate organizations are relying on IT and internet to survive. Effective strategy to combat...

Pakistani Cyber Warriors are the example of political hacktivists. On the other hand, trespass and unauthorized access are the acts of break into the websites of corporate organizations or government. Spammers or interference on website of other people or organizations is trespass. For example, the court convicted seven Milwaukee teenagers for computer trespassing. Although, they claimed they were playing games.
Thus, it is very critical to employ appropriate measure to secure electronic frontier due to the damages that cyber crimes do to corporate organizations. In 2009, some group of Chinese hackers broke into the computers of 30 corporate companies, which include Yahoo, Google, and stole intellectual properties of these companies. Moreover, the court charged Albert Gonzales and his two co-conspirators for penetrating the networks of several companies and stole more than 130 million credit card numbers. The governments need to increase the public awareness and implement crisis management training to enhance cyber security protection.

Reference

Berkowitz, B. & Hahn, R.W. (2003).Cyber-security: Who's Watching Store? Issue of Science and Technology.

Goel, S. (2011). Cyberwarfare: Connecting the Dots in Cyber Intelligence. Communications of the ACM. 54 (8): 132-140.

Rosenzweig, P. (2012). The International Governance Framework for Cybersecurity. Canada-United States Law Journal.37 (1).

Sources used in this document:
Reference

Berkowitz, B. & Hahn, R.W. (2003).Cyber-security: Who's Watching Store? Issue of Science and Technology.

Goel, S. (2011). Cyberwarfare: Connecting the Dots in Cyber Intelligence. Communications of the ACM. 54 (8): 132-140.

Rosenzweig, P. (2012). The International Governance Framework for Cybersecurity. Canada-United States Law Journal.37 (1).
Cite this Document:
Copy Bibliography Citation

Related Documents

Electronic Medical/Health Records Utilizing Electronic
Words: 5456 Length: 18 Document Type: Thesis

However, because they make billing more efficient, the majority of large urban practice groups and hospitals have already made the switch to electronic records, according to Michael R. Costa, attorney and associate at Greenberg Traurig, LLP, in Boston, Mass. However, he adds, most of these organizations maintain warehouses where they store paper records that have been transcribed to electronic form. "There is resistance from some about going to a

Securing Data from Malware and Phishing Attempts
Words: 1110 Length: 4 Document Type: Essay

IT Security Policy for a Medical FacilityData security is necessary for all businesses but especially for a medical facility which faces extra scrutiny because it hosts patient data and other sensitive information. This policy provides recommendations for the medical facility in terms of information security and device management.Information Security Policy OverviewThis policy serves as a guideline to protect the medical facility\\\'s information assets, and includes guidance on application development security,

Medical ID Theft and Securing Ephi Medical
Words: 617 Length: 2 Document Type: Essay

Medical ID Theft and Securing EPHI Medical Identity Theft Medical information can be stolen by 1) the bad guys getting sick and using a victim's information to obtain services, 2) friends or relatives use another friend's or relative's information to obtain treatment, 3) when professionals, such as physicians, fabricate services that did not exist, 4) organized crime, and 5) innocent or not so innocent opportunists (Lafferty, 2007). Bad guys that get sick

Internet & Electronic Marketing Website & Business
Words: 3210 Length: 11 Document Type: Essay

Internet & Electronic Marketing Website & Business Model Target Market & Consumer Behavior Building & Maintaining Customer Relationships F. Recommendations for Website Improvement G. Conclusion H. References Pace University is a comprehensive non-profit university that offers its educational services to online students and to the more traditional brick-and-mortar student. As the university competes with global universities, the web presence must convey the value and quality of the education as well as enable the student to make an

Impact of Information System in Health Sector
Words: 4816 Length: 15 Document Type: Term Paper

Information Technology on the Healthcare sector Healthcare systems serve to perform the very important function of preserving human capital. In modern society, health care assumes significance not just in terms of the expenditure it generates, but also because it is a large-scale consumer of goods and services, important employer and contributes in research and development. From the perspective of countries, maintaining and improving health care services require significant investments. Consequently

Manufacturing Our Demise Environmental Impact
Words: 1220 Length: 3 Document Type: Term Paper

Initial concentrations may be minute, but because the body does not adequately eliminate or metabolize these compounds, they accumulate in the tissues. This occurs until the concentrations become significant enough to interfere with the bodies functions. This is problem is exacerbated by the challenges associated with the extraction of these metals from the environment, once they have entered. These metals are very difficult and expensive to remove from contaminated

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now