Preview

Cis 324 Final Paper Due - Short History on Cyber Space

Better Essays
Open Document
Open Document
1786 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis 324 Final Paper Due - Short History on Cyber Space
‘A Short History of Cyber Security '
Alex R. Meltzer
Strayer University
Computer Ethics
CIS 324
Professor Prem Jadhwani
September 02, 2012

The Internet has been designed as a ‘pool of endless information’ for anyone who has access. With its introduction in the mid 1990’s, it has vastly changed the way we do business, obtain all kinds of data and the way we communicate in the world today. With its sheer potential, we have created the most powerful tool of our modern day technology. In a series of memos that were first written in 1962, by an MIT expert of the name of J.C.R Licklider, he had envisioned a type of ‘network’ in which a set of computers were globally interconnected in sharing information and anyone could access data from anyone of these terminals (Leiner, Cerf, Kahn & Clark, 1962-1974). The Internet society believe that the Internet should be used by everyone freely, meaning that the number one objective is to promote the development, security and stability of the World Wide Web. Malicious attacks such as viruses, spams, spyware and other viscous attacks on hardware and software have become well known wide spread through the web. These attacks often result in irreparable damage and abuse the very freedom the Internet principles were based on (Internet security," 2012). Many aspects of our lives include the electronic transferring of data through some means of electronic devices such as cell phones, computers and other mobile devices such as emails and text messaging. Everything from traffic signals, car technology and airport/airplane navigation has been linked to the usage of transferring vital information via the web and through other communication channels. Government data such as birth records, social security documentation and tax records also need to be protected. This information is very confidential and establishes the identity of millions of people in the world today. What exactly is cyber security? In its broadest



References: cybersecurity. (2010, December). Retrieved from http://whatis.techtarget.com/definition/cybersecurity Combat cyber crime. (n.d.). Retrieved from http://www.dhs.gov/combat-cyber-crime Internet security. (2012). Retrieved from http://www.internetsociety.org/what-we-do/issues/security?gclid=CNydtKjAr7ICFYSo4AodvnIA0g Koebler, J. (2012, September 11). Obama may use executive order to advance cybersecurity policies. Retrieved from http://www.usnews.com/news/articles/2012/09/11/obama-may-use-executive-order-to-advance-cybersecurity-policies Leiner, B., Cerf, V., Kahn, R., & Clark, D. (1962-1974). Brief history of the internet. Retrieved from http://www.internetsociety.org/internet/internet-51/history-internet/brief-history-internet O 'Brien, R. (2007, January 22). Cyber crime 's impact on businesses. Retrieved from http://www.ebizq.net/topics/soa_security/features/7573.html?page=2 Why cyber security is so important. (2010, October). Retrieved from http://hawaii.gov/dags/icsd/cst/newsletters/2010/october-2010-why-cyber-security-is-important

You May Also Find These Documents Helpful

  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    In 1969, the first message, “login”, was sent over ARPANET, the predecessor of today’s internet (Kleinrock, 2008). ARPANET was designed as a communication system that would allow researchers to access information from other researcher’s computers around the country, therefore allowing information to flow more freely (Kleinrock, 2008). Computers and the internet have become intertwined into our daily lives.…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    His 145 Matrix

    • 740 Words
    • 3 Pages

    References: Howe, w. (2010). An anecdotal history of the people and communities that brought about the Internet and the Web . Creative Commons Attribution- Noncommercial-Share Alike 3.0 United States License. Based on a work at www.walthowe.com.. Retrieved from http://www.walthowe.com/navnet/history.html…

    • 740 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Halsall, Paul. "Internet History Sourcebooks." Internet History Sourcebooks. July 1998. Fordham University. 24 Jan. 2013 .…

    • 2273 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The US should come forth with an efficient policy discussing the matter directly and including its future uses of cyber-intelligence. Presently, cyber-attacks are uncommon; however they still pose a risk in the future of war and security of a nation. Every country should take measures in ensuring they will be ready for an attack. Because of this extraordinary hazard, the US should make considerable ventures in organizing methods to secure itself and its nation against it.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Best Essays

    9. U.S. Department of Homeland Security (2003). Homeland Security Presidential Directive 7: Critical infrastructure identification, prioritization, and protection. Retrieved from http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Third Crusade

    • 897 Words
    • 3 Pages

    Internet History Sourcebooks Project. 2014. Internet History Sourcebooks Project. [ONLINE] Available at: http://www.fordham.edu/halsall/source/1192peace.asp. [Accessed 11 April 2014].…

    • 897 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Humanities Course Paper

    • 1596 Words
    • 7 Pages

    Through the past several decades the advancement of technology has evolved. Among one of the advancements was the Internet. The Internet is a worldwide of networks connecting millions of computers. Through the Internet countries are able to exchange data, news and opinions. It started in the 1960’s when the internet was originally being used for government which later evolved to the world (Computer history museum, 2006). Over the past forty years the internet has changed technology of computers and how the world communicates, online banking, social networking, and online shopping. The Internet we know today grew from seeds planted by the U.S. Government. The Department of Defense issued a twenty thousand dollar contract on December 6, 1967 for the purpose of studying the design and specification of a computer network (Internet History from ARPANET to Broadband, 2007). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet (Computer history museum, 2006). The ARPA laid the groundwork which later became the internet. By 1992 the Internet has one million hosts (Ganna, 2006). Through the years the Internet has changed the way people live and run businesses. My project will walk through the discovery and evolution of the Internet.…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    The Future Of Criminology

    • 2252 Words
    • 6 Pages

    Hirschfeld Davis, J. (2015). Obama Calls for New Laws to Bolster Cybersecurity. Retrieved from http://www.nytimes.com/2015/01/14/us/obama-to-announce-new-cyberattack-protections.html?_r=0…

    • 2252 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    In 1995, President Bill Clinton issued a presidential decision directive, ordering agencies of the executive branch of government to prioritize resources devoted to combating the threat of global crime, improve internal coordination, collaborate with other governments to develop a global response, and aggressively and creatively use all legal means available to combat…

    • 1073 Words
    • 5 Pages
    Better Essays