Preview

Cybersecurity Resolution

Powerful Essays
Open Document
Open Document
3606 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybersecurity Resolution
INTERNATIONAL
MODEL UNITED NATIONS CONFERENCE (2013)
GENERAL ASSEMBLY MAIN SUBMITTER: The Kingdom Of Denmark
CO-SUBMITTERS: The State of Japan,
SIGNATORIES: The Kingdom of Saudi Arabia, The French Republic, The Republic of the Philippines, Democratic Republic of Algeria, The Russian Federation, The Republic of Croatia, The Republic of India, The Republic of Tunisia, United States of America, The Islamic Republic of Afghanistan, The Argentine Republic, The Commonwealth of Australia, The Republic of Azerbajian, The Kingdom of Bahrain, The People’s Republic of Bangladesh, The Kingdom of Belgium, The Federated Republic of Brazil, The Kingdom of Cambodia, Canada, The Republic of Chile, The Republic of Colombia, The Republic of Croatia, The Republic of Cuba, The Czech Republic, The Democratic People’s Republic of Korea, The Democratic Republic of Congo, The Arab Republic of Egypt, Georgia, The Federal Republic of Germany, The Republic of Ghana, The Republic of Guatemala, The Republic of Indonesia, The Islamic Republic of Iran, The Republic of Iraq, The Republic of Ireland, The State of Israel, The Italian Republic, Jamaica, The Republic of Kenya, The State of Kuwait, Laos, Libya, Luxembourg, Malaysia, Mauritius, Mexico, Morocco, Namibia, Netherlands, New Zealand, Nigeria, Norway, Pakistan, Paraguay, Peru, Poland, Portugal, Qatar, Republic of Korea, Rwanda, Serbia, Spain, Sri Lanka, Sudan, Sweden, Switzerland, Syria, Thailand, Togo, Turkey, Uganda, Ukraine, UAE, UK, US, Venezuela

TBC

Resolution by the General Assembly
Bearing In Mind previous United Nations resolutions on the issue, such as, but not limited to, A/RES/55/63, A/RES/56/121, A/RES/57/239, A/RES/58/199, A/RES/64/211, and the methods and means in which they deal with the issue, and the obligations placed on member nations,

Deeply concerned that the prevalence of the use of the Internet for terrorist purposes is a rapidly growing phenomenon that will pose as a threat to many other

You May Also Find These Documents Helpful

  • Good Essays

    i. Contemporary terrorist organizations are harmonizing their activities with scientific and technological discoveries, and in particular with the Internet and communication technologies. Collectively, this phenomenon is known as mega-terrorism.…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    a resolution of the member governments of the Organization of Economic Cooperation and Development (OECD)…

    • 640 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Davidson, J.W, DeLay, B. Heyrman, C.L., Lytle, M.H., Stoff, M.B.( 2008) Nations of Nations: A…

    • 2748 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Davidson, J. W., Brian, D., Heyrman, C. L., Lytle, M. H., Stoff, M. B. (2008). Nation of nations:…

    • 4532 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Ap Human Geography Final

    • 614 Words
    • 3 Pages

    "Global Issues at the United Nations." UN News Center. UN, n.d. Web. 27 May 2013.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Libicki, M. C. (2009). The information environment. In America’s Security Role in a Changing World: Global Strategic Assessment 2009, 53-55.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Terrorism is one of the most remembered and feared occurrences in the world. Terrorism changes the lives and hearts of everyone that it affects. This paper explores the different types of terrorism, who commits the acts, how it affects the surrounding world, and what can be done to prevent it. This review of the different types of terrorism focuses primarily on the specific types of terrorism. This paper then tries to relay to the reader the understanding of all types, and the differences between them.…

    • 1251 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Information technology has drastically altered the Homeland Security world in many ways. The largest form of information technology, the internet, has caused the greatest change for Homeland Security Agencies. For many years now the internet has widely been used for terrorist communication, but more concerning now is the internet is being used to generate support and as a recruiting tool for terrorist organizations. In addition, they are also using the internet for training of terrorists since training camps are being actively pursued and neutralized by the intelligence community.…

    • 493 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Empower Girl Child

    • 3507 Words
    • 15 Pages

    * The views expressed in this paper are those of the author and do not necessarily represent those of the United Nations…

    • 3507 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    The internet has become a major centre of extremist activity, one so important that Osama bin Ladin back in 2002 said that 90% of all jihadist activity will soon be through the media, which in turn is increasingly being dominated, at least from a jihadi point of view by the internet. Often spread out geographically, communication online has become the primary tool for their discussion and organization. Not only cat-lovers but also radical Islamist movements have capitalised on the potential of the Internet. Using websites to spread their message, they have increased their reach in the 21st century, spreading its radical messages and gaining recruits in the West.…

    • 1013 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    ECOSOC 2014

    • 587 Words
    • 2 Pages

    The next resolution was submitted by the delegates of the Bahamas , Gambia , Guyana , Iran , Vanuatu and Myanmar together which…

    • 587 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    High Tech Surveillance

    • 3994 Words
    • 16 Pages

    Introduction The Internet and other communication technologies build cyber-bridges across (and between) nations, cultures, communities and businesses. Verbal and visual images of world events such as the 11th September, 2001 bombings in the US (which for many is seen as a watershed and after which life may never be quite the same again), the tidal wave of Severe Acute Respiratory Syndrome (SARS) and the more recent Madrid bombing in March 2004 were communicated across the world in a matter of minutes. Likewise, it has a darker side when terrorists and other miscreants determined on undesirable or coercive behaviour are also known to have capitalised on technology’s connectivity. In the workplace, there is an increasing, almost obsessive, fear of industrial espionage and employee betrayal. Against this backdrop of rising environmental uncertainty and turbulence, Demb and Neubauer’s (1992)…

    • 3994 Words
    • 16 Pages
    Powerful Essays