Preview

Social Problem of Network Information Security

Better Essays
Open Document
Open Document
1380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Social Problem of Network Information Security
Along with computer technology's swift development, the information network already became the social development the important guarantee. The information network involves to the national government, the military, the culture and education and so on many domains, the memory, the transmission and processing many information is the government macroeconomic regulation and control decision-making, the commercial economy information, the bank fund account transfer, the stock negotiable securities, the energy resources data, the scientific research data and so on important information. And has many are the sensitive information, even is the national secret, will therefore attract unavoidably from the world's each kind of artificial attack (e.g. information divulging, information steals, data distortion, data to delete adds, computer virus and so on). Usually is very difficult using the computer-related crime to leave behind the crime evidence, this greatly has also stimulated the computer high-tech criminal case's occurrence. Computer crime rate's rapid increase causes various countries' the computer system is specially the network system is facing the very big threat, and becomes one of serious social questions.
The network information security is the important question which a relations national security and the sovereignty, the social stability, the national culture inherits and develops. Its importance, is speeding up along with the global informationization step is getting more and more important. The network information security is one involves the computer science, the networking, the communication, the password technology, the information security technology, the applied mathematics, the theory of numbers, the information theory and so on many kinds of discipline comprehensive disciplines. It is mainly refers to network system's hardware, the software and system's data receives the protection, not is destructed accidental or the malicious reason, the change, the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Pervasive influence of information technology with penetration of computers and communication in all aspect of the workplace, it is important for a organization to keep up with the advancement of technology in the criminal justice and security agency. Technology is playing a major role in how criminals for committing crimes, which is why there has been a increase in cyber crimes because a criminal…

    • 750 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Air Wright case study

    • 1396 Words
    • 5 Pages

    Today if we are talking about computer security there are different terminologies that contribute in making the outline of computer security. It is the combination of different processes and mechanism by which important and sensitive information are secluded from publication and tampering by unauthorized persons. The major focus of computer security is to protect information and critical data from unauthorized usage. Computer security has deep roots in Information technology industry. Security in IT can be defined as a branch of computer science which is related to control of different kinds of risks associated with critical data. This can be done only if the authorized person dealing with the system network or administration secures this information with good software and servers which are designed to work heavily.…

    • 1396 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will define computer-related crime as a traditional crime where a computer is used to carry out, record actions, or provide evidence of a crime. The beginnings of the problem of investigating cyber crime come in the form of reporting. For many reasons cyber crimes tend to go unreported or severely underreported. Another problem is that law enforcement officials (as well as parents and their children) do not have adequate training, allocation of funds, coordination with other agencies, or proper understanding of applicable laws that pertain to cyber crime. From all angles cyber crime is a difficult problem to tackle, and there is a definite need for law enforcement to catch up with the technology of cyber space, which is quickly becoming a feeding ground for illegal and illicit activity.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    White Paper

    • 1119 Words
    • 5 Pages

    The research provides an overview of the threats and vulnerabilities to information security and introduces the important terms and conditions. Further more, the research sum up the definitions and controls of the trusted computer system evaluation criteria and discuss the policy of information security while focusing on information control and dissemination.…

    • 1119 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Computer Forensics

    • 504 Words
    • 3 Pages

    There is little debate that electronic technology including computers and the Internet are one of the most important developments of recent times. Tasks that took days to complete and that demanded hundreds of man hours to effectively execute can now be easily done at the touch of a button. But the growing importance of technology is not without its drawbacks with probably the most major one being internet and computer enabled crime.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Many crimes that are not specifically related to computers can be substantially facilitated by the use of computers. The easy access of cyberspace can provide a low-cost high-connectivity way for criminals to reach victims.…

    • 238 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…

    • 11163 Words
    • 45 Pages
    Powerful Essays
  • Good Essays

    Firstly, the number of crimes on the Internet at breakneck speed is increase in the past few years. For example, we sometimes encounter some fraud when we do some shopping on the Internet. In this case, we are doing procurement and they do not sent to the buyer, although the money has been sent to the seller. This is very difficult to track down criminals, because we have almost no criminals, who they are, what they do, even where they live we also don’t know. If we use the Internet for online shopping, our credit card number is stolen, then the money in our bank account may be used up. Using the Internet to do our personal information is not safe, especially those important document. In fact, when we surf the Web, reading e-mail, download software, even with our friends, is called a hidden program, Trojan chat, can send to our computer without our knowing. It will steal and transfer all the information that we already save. After that, this person may make use of it to others. (Nguyen Long Quoc, 2008)…

    • 834 Words
    • 4 Pages
    Good Essays