Securing The Electronic Transfer Securing Research Paper

Length: 3 pages Sources: 3 Subject: Military Type: Research Paper Paper: #38772049 Related Topics: Cybersecurity, Cyber Crimes, Cyber Crime, Hacking
Excerpt from Research Paper :

Essentially, securing the electronic frontier is very critical because of the potential harms that cyber crime and fraud cause to individual, businesses and nations as a whole.

One of the effective strategies that could be employed to secure the electronic frontier is the collaboration of the government with the private and public organizations. Increasing number of governments has implemented method to secure the electronic frontier without success. Since corporate organizations are more equipped to counter IT threats than the government, a collaboration of the government with organizations will be more effective.

Moreover, the international organizations such as the United Nations should also play effective roles in securing electronic frontier. The United Nation should make a law to ensure that all member nations are obliged to secure electronic transfer in their respective nations since lack of cross-border treaties for data sharing is creating havoc to corporate organizations. Essentially, some countries such as Russia and China are assisting some organizations to engage in cyber crimes, which are causing harming to corporate organizations. Thus, there is a need to adopt international treaty to govern the cyber conflict.

Some countries are beginning to implement restrictions on cyber traffic and specific IP address. Some countries have even gone to the length of banning electronic communications with foreign countries. Banning and

...

Effective strategy to combat IT warfare is for the government to assist private and public organizations in their respective countries to prevent potential IT threats.

Hacktivism is the act of carrying out the hacking with a political motive. Pakistani Cyber Warriors are the example of political hacktivists. On the other hand, trespass and unauthorized access are the acts of break into the websites of corporate organizations or government. Spammers or interference on website of other people or organizations is trespass. For example, the court convicted seven Milwaukee teenagers for computer trespassing. Although, they claimed they were playing games.

Thus, it is very critical to employ appropriate measure to secure electronic frontier due to the damages that cyber crimes do to corporate organizations. In 2009, some group of Chinese hackers broke into the computers of 30 corporate companies, which include Yahoo, Google, and stole intellectual properties of these companies. Moreover, the court charged Albert Gonzales and his two co-conspirators for penetrating the networks of several companies and stole more than 130 million credit card numbers. The governments need to increase the public awareness and implement crisis management training to enhance cyber security protection.

Reference

Berkowitz, B. & Hahn, R.W. (2003).Cyber-security: Who's Watching Store? Issue of Science and Technology.

Goel, S. (2011). Cyberwarfare: Connecting the Dots in Cyber Intelligence. Communications of the ACM. 54 (8): 132-140.

Rosenzweig, P.…

Sources Used in Documents:

Reference

Berkowitz, B. & Hahn, R.W. (2003).Cyber-security: Who's Watching Store? Issue of Science and Technology.

Goel, S. (2011). Cyberwarfare: Connecting the Dots in Cyber Intelligence. Communications of the ACM. 54 (8): 132-140.

Rosenzweig, P. (2012). The International Governance Framework for Cybersecurity. Canada-United States Law Journal.37 (1).


Cite this Document:

"Securing The Electronic Transfer Securing" (2013, August 07) Retrieved January 23, 2022, from
https://www.paperdue.com/essay/securing-the-electronic-transfer-securing-94153

"Securing The Electronic Transfer Securing" 07 August 2013. Web.23 January. 2022. <
https://www.paperdue.com/essay/securing-the-electronic-transfer-securing-94153>

"Securing The Electronic Transfer Securing", 07 August 2013, Accessed.23 January. 2022,
https://www.paperdue.com/essay/securing-the-electronic-transfer-securing-94153

Related Documents
Electronic Information Security Documentation During
Words: 1268 Length: 3 Pages Topic: Education - Computers Paper #: 38313136

Risk analysis projects are relatively expensive, and were so even in the mainframe computing era, because they involved the collection and evaluation of a significant volume of data. Earlier risk studies were conducted by in house staff or consultants and the in house people did not have much experience regarding the matter and the consultants did not know much about the requirements of the organization. Presently, the familiarization task has

Electronic Health Record EHR Bearing the Everyday
Words: 1138 Length: 3 Pages Topic: Healthcare Paper #: 65141792

Electronic Health Record (EHR) Bearing the everyday evolution of the technology used in hospitals and the Healthcare sector in general, there is need to understand the concept of EHR. This paper undertakes to divulge what EHR is, the components, the advantages that it brings to the Healthcare department in general as well as the complications or loopholes that may come with it and suggestions on how this system can be used

Electronic Cash and Smart Cards Forms of
Words: 2004 Length: 6 Pages Topic: Economics Paper #: 11050138

Electronic Cash and Smart Cards Forms of electronic cash came about in the 1990s with the rise of the Internet and a new way to do business. Smart cards were among the new forms. When purchasing products over the Internet, consumers have concerns about the privacy of their information with electronic payments. Some studies were conducted to evaluate the pros and cons of smart cards, how the security is designed in

Secure Mobile Payment Service Mobile
Words: 2871 Length: 6 Pages Topic: Business Paper #: 57231243

The customer owes money to a friend or wishes to transfer money to someone. In this situation there are three options available. If the two parties are in the proximity of each other the payee's device sends the transaction data over to the payer's handset using either IrDA, BT, or RFID communication. If the two parties are not in the position of using a direct link, the payee can

Electronic Medical Records in Healthcare
Words: 5687 Length: 17 Pages Topic: Healthcare Paper #: 49798024

In case of referrals, the physicians are able to share information with ease allowing a more accurate diagnosis to be made and the sending of reports between the two physicians becomes easy since it is electronic. In these ways, electronic medical records systems help physicians and healthcare organization to improve the quality of care provided to patients as well as improving the relationship between the patient and the physician

Electronic Database for Records Medical Division
Words: 756 Length: 3 Pages Topic: Medical  (general) Paper #: 31752919

Medical Affairs Department: Implementing Electronic Database Record Keeping Feasibility Analysis: This project is very feasible as it is a standard updating of record keeping procedures from manual to electronic database -- which is common practice among most records departments today. There is nothing exceptional or impractical about this project and it can be accomplished with relatively little cost, little time devoted to the transition, and few risks. Technical Feasibility: The project is technically