Essentially, securing the electronic frontier is very critical because of the potential harms that cyber crime and fraud cause to individual, businesses and nations as a whole. Effective strategy to combat IT warfare is for the government to assist private and public organizations in their respective countries to prevent potential IT threats.
One of the effective strategies that could be employed to secure the electronic frontier is the collaboration of the government with the private and public organizations. Increasing number of governments has implemented method to secure the electronic frontier without success. Since corporate organizations are more equipped to counter IT threats than the government, a collaboration of the government with organizations will be more effective.
Moreover, the international organizations such as the United Nations should also play effective roles in securing electronic frontier. The United Nation should make a law to ensure that all member nations are obliged to secure electronic transfer in their respective nations since lack of cross-border treaties for data sharing is creating havoc to corporate organizations. Essentially, some countries such as Russia and China are assisting some organizations to engage in cyber crimes, which are causing harming to corporate organizations. Thus, there is a need to adopt international treaty to govern the cyber conflict.
Some countries are beginning to implement restrictions on cyber traffic and specific IP address. Some countries have even gone to the length of banning electronic communications with foreign countries. Banning and ...
Hacktivism is the act of carrying out the hacking with a political motive. Pakistani Cyber Warriors are the example of political hacktivists. On the other hand, trespass and unauthorized access are the acts of break into the websites of corporate organizations or government. Spammers or interference on website of other people or organizations is trespass. For example, the court convicted seven Milwaukee teenagers for computer trespassing. Although, they claimed they were playing games.
Thus, it is very critical to employ appropriate measure to secure electronic frontier due to the damages that cyber crimes do to corporate organizations. In 2009, some group of Chinese hackers broke into the computers of 30 corporate companies, which include Yahoo, Google, and stole intellectual properties of these companies. Moreover, the court charged Albert Gonzales and his two co-conspirators for penetrating the networks of several companies and stole more than 130 million credit card numbers. The governments need to increase the public awareness and implement crisis management training to enhance cyber security protection.
Berkowitz, B. & Hahn, R.W. (2003).Cyber-security: Who's Watching Store? Issue of Science and Technology.
Goel, S. (2011). Cyberwarfare: Connecting the Dots in Cyber Intelligence. Communications of the ACM. 54 (8): 132-140.
Effective strategy to combat IT warfare is for the government to assist private and public organizations in their respective countries to prevent potential IT threats.
Risk analysis projects are relatively expensive, and were so even in the mainframe computing era, because they involved the collection and evaluation of a significant volume of data. Earlier risk studies were conducted by in house staff or consultants and the in house people did not have much experience regarding the matter and the consultants did not know much about the requirements of the organization. Presently, the familiarization task has
Electronic Health Record (EHR) Bearing the everyday evolution of the technology used in hospitals and the Healthcare sector in general, there is need to understand the concept of EHR. This paper undertakes to divulge what EHR is, the components, the advantages that it brings to the Healthcare department in general as well as the complications or loopholes that may come with it and suggestions on how this system can be used
Electronic Cash and Smart Cards Forms of electronic cash came about in the 1990s with the rise of the Internet and a new way to do business. Smart cards were among the new forms. When purchasing products over the Internet, consumers have concerns about the privacy of their information with electronic payments. Some studies were conducted to evaluate the pros and cons of smart cards, how the security is designed in
The customer owes money to a friend or wishes to transfer money to someone. In this situation there are three options available. If the two parties are in the proximity of each other the payee's device sends the transaction data over to the payer's handset using either IrDA, BT, or RFID communication. If the two parties are not in the position of using a direct link, the payee can
In case of referrals, the physicians are able to share information with ease allowing a more accurate diagnosis to be made and the sending of reports between the two physicians becomes easy since it is electronic. In these ways, electronic medical records systems help physicians and healthcare organization to improve the quality of care provided to patients as well as improving the relationship between the patient and the physician
Medical Affairs Department: Implementing Electronic Database Record Keeping Feasibility Analysis: This project is very feasible as it is a standard updating of record keeping procedures from manual to electronic database -- which is common practice among most records departments today. There is nothing exceptional or impractical about this project and it can be accomplished with relatively little cost, little time devoted to the transition, and few risks. Technical Feasibility: The project is technically