Saturday, June 18, 2016

Discussion Week 10 - CIS 170

Information Security and Digital Crime and Terrorism

From the first e-Activity, identify one to two (1-2) potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative.

Two potential ethical challenges that security professionals will face is the increased level of fraud and computer crime. Due to advances in technology and new innovations this will cause a significant increase in the leverage that criminals possess.

As routine activities ensue the clash between ethical and non-ethical behavior rears its head as a predominant factor in the fight being waged against criminal behavior. Even with technical advances, mobile application devices and innovative challenges that pertain to criminal activity the circumventing and preventing of these criminal acts has many alternating facets that are used in a complementary fashion to try to mitigate future challenges.

Speculate on one (1) solution that security professional could take in order to mitigate the challenge(s) in question. Justify your response.

Because high levels of ethics are used this helps guarantee the integrity of the challenge, guaranteeing of privacy and the protective stance toward the general welfare of the public. Foiling the crime or breaking a continuous pattern is the goal wanted and by upgrading security fields of companies to guard “near sacred” information is the necessitated step. Utilizing an aggressive counter is my suggestion once activity has been reported with an encryption and scrambler in each outer and inner port.

Further upgrading penalties with prison time and reward status offered should alleviate some threats measured with confidentiality.

From the second e-Activity, among the three (3) definitions of cyber terrorism, give your opinion as to the one (1) definition that is the most accurate with regard to information security and infrastructure protection.

The one definition that I conclusively agree with is that cyber terrorism is a form of internet attack whose purpose is to seek and destroy. Even with an abstract view terrorism is terrorism with a purpose of causing intimidation and fear. Whether the full comprehension is not the same the idea and purpose is. Full articulation is allowable but seen as irrational and weak by opposing agents. Tossing aside systematic rulings the most simplistic way to relay disapproval is to relay it in a blunt forthright way irregardless of opinions.

Invasion of a country infrastructure is the first stage of war because of this kind of attack this relays that opposing forces are moving to compromise security. Each country’s primary is to protect information security and infrastructure by any means.

Next, describe the impact that digital crimes and digital terrorism are likely to have in the future. Provide a rationale for your response.

The impact that digital crimes and digital terrorism will have in the future will most likely cause rifts in alliances and problematic communication and huge financial cost if the situation is not contained. Also, a certain step toward certain informational banks in each country is a declaration of war and should be retaliated to show lack of fear and competence to stand and fight back. A country that is being attacked by an opposing force has no option but to address the situation whereas an inner attack can be seen in same way that they are debilitating to a company or country for financial gain with no care or loyalty for country and foil it cruelly. Political or ideological objective is also a facet that acts as a facilitator with thoughts of damage or some psychological perversion to make someone pay.

https://www.scribd.com/doc/396851/Security-and-Ethical-Challenges
https://en.wikipedia.org/wiki/Cyberterrorism

Reply to co-student #1

Although the privacy issue is a major factor in the investigating and securing of evidence and some may be compromised but felonious material found has to be reported and subsequently charged. Because people know of the limited police force and the overstressed and overworked legal force they attempt to take advantage but as stated if records are visually seen and evidenced they have to report it and will still be considered ethically correct.

Unfortunately, the media has a tendency to over blow events and if a severe act of cyber terrorism is ongoing limited leakage should be to them. Resolving the situation quickly and correctly to prevent further damage by the attack is what is needed not panic.

Thank you.

Felicia

Reply to co-student #2

I agree with your points that the privacy issue may be compromised but with a high ethical approach the search is for the contraband but if child pornography is seen and evidenced the complete computer system will be torn down and grilled until everything can be gained to nail and close the case.

Evidence that is of a felonious nature has to be reported if seen and as such the privacy issue is a mute issue and silenced. Also, I agree with the steps that you delineated but the legal process is to find and seek and charge.

Cyber terrorism is indeed a tricky situation but nailing them and opposition that is figuratively in charge of disrupting the function of this country is primary.

I feel that the gloves should be taken off.

Thank you.

Felicia

No comments:

Post a Comment