Preview

Cis 324 Final Paper Due - Short History on Cyber Space

Better Essays
Open Document
Open Document
1786 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis 324 Final Paper Due - Short History on Cyber Space
‘A Short History of Cyber Security '
Alex R. Meltzer
Strayer University
Computer Ethics
CIS 324
Professor Prem Jadhwani
September 02, 2012

The Internet has been designed as a ‘pool of endless information’ for anyone who has access. With its introduction in the mid 1990’s, it has vastly changed the way we do business, obtain all kinds of data and the way we communicate in the world today. With its sheer potential, we have created the most powerful tool of our modern day technology. In a series of memos that were first written in 1962, by an MIT expert of the name of J.C.R Licklider, he had envisioned a type of ‘network’ in which a set of computers were globally interconnected in sharing information and anyone could access data from anyone of these terminals (Leiner, Cerf, Kahn & Clark, 1962-1974). The Internet society believe that the Internet should be used by everyone freely, meaning that the number one objective is to promote the development, security and stability of the World Wide Web. Malicious attacks such as viruses, spams, spyware and other viscous attacks on hardware and software have become well known wide spread through the web. These attacks often result in irreparable damage and abuse the very freedom the Internet principles were based on (Internet security," 2012). Many aspects of our lives include the electronic transferring of data through some means of electronic devices such as cell phones, computers and other mobile devices such as emails and text messaging. Everything from traffic signals, car technology and airport/airplane navigation has been linked to the usage of transferring vital information via the web and through other communication channels. Government data such as birth records, social security documentation and tax records also need to be protected. This information is very confidential and establishes the identity of millions of people in the world today. What exactly is cyber security? In its broadest



References: cybersecurity. (2010, December). Retrieved from http://whatis.techtarget.com/definition/cybersecurity Combat cyber crime. (n.d.). Retrieved from http://www.dhs.gov/combat-cyber-crime Internet security. (2012). Retrieved from http://www.internetsociety.org/what-we-do/issues/security?gclid=CNydtKjAr7ICFYSo4AodvnIA0g Koebler, J. (2012, September 11). Obama may use executive order to advance cybersecurity policies. Retrieved from http://www.usnews.com/news/articles/2012/09/11/obama-may-use-executive-order-to-advance-cybersecurity-policies Leiner, B., Cerf, V., Kahn, R., & Clark, D. (1962-1974). Brief history of the internet. Retrieved from http://www.internetsociety.org/internet/internet-51/history-internet/brief-history-internet O 'Brien, R. (2007, January 22). Cyber crime 's impact on businesses. Retrieved from http://www.ebizq.net/topics/soa_security/features/7573.html?page=2 Why cyber security is so important. (2010, October). Retrieved from http://hawaii.gov/dags/icsd/cst/newsletters/2010/october-2010-why-cyber-security-is-important

You May Also Find These Documents Helpful

  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    His 145 Matrix

    • 740 Words
    • 3 Pages

    References: Howe, w. (2010). An anecdotal history of the people and communities that brought about the Internet and the Web . Creative Commons Attribution- Noncommercial-Share Alike 3.0 United States License. Based on a work at www.walthowe.com.. Retrieved from http://www.walthowe.com/navnet/history.html…

    • 740 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Third Crusade

    • 897 Words
    • 3 Pages

    Internet History Sourcebooks Project. 2014. Internet History Sourcebooks Project. [ONLINE] Available at: http://www.fordham.edu/halsall/source/1192peace.asp. [Accessed 11 April 2014].…

    • 897 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Introduction Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    What was to ultimately turned out to be known as ‘The Internet' was developed in the 1960s through funding by the US military so as to discover a means of making possible communication in the event of nuclear conflict . Until the beginning of 1990s, though, the Internet was the sphere of influence of academics as well as researchers as commercial use was proscribed. A process of commercialization began in the late 1980s and the wider use this encouraged was to be given an additional heightening with the emergence of the World Wide Web in the beginning of 1990s. The progress of browsers in the early 1990s which facilitated web pages to be viewed in a graphical format in color after that brought the benefits of the Internet to a wider community. The World Wide Web was to develop at an exponential rate together in terms of the number of websites as well as users as shown in Figures 1. This changed some in the business community to its potential as a means of communication also as a sales and marketing channel.…

    • 3365 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    The Internet has become a daily ritual for Americans. So many people rely on technology and computers to do their shopping, banking, and communications. Where most of this used to be done in face-to-face communications, the ability to do it online has become increasingly popular because of the ease of use, but it is also putting fear in people as to whether their personal information is protected or not, and if our information is protected what does that exactly mean and who has access to it and how? This paper will examine cyber terrorism and information warfare, what has happened in past years and what needs to be done to not only protect our country, but us as citizens.…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Cyber-war, the use of computers and the internet in conducting warfare in cyberspace, has been introduced as both an effective offense and defense towards modern warfare. Presently many countries have developed a policy towards cyber-warfare. The US, although a strong influence to the world, has yet to step up and create an effective policy towards warfare. One that should state what the military would do to respond to a cyber-attack, what defines a cyber-attack and what the government will do to take effective measures against a catastrophic attack. Along with that, what advantages does this new type of warfare have against modern warfare and is it worth the massive amounts of training and investments. Also, in what circumstances should a…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Howe, W. (n.d.). A Brief History of the Internet. Retrieved June 8, 2009, from Walt Howe 's Internet Learning Center: http://www.walthowe.com/…

    • 2757 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Terrorism

    • 1710 Words
    • 7 Pages

    The roots of cyber terrorism can be traced back to the early 1990s when the Internet began to emerge. The introduction of the “information society” sparked many studies which focused on the potential risks faced by the highly networked and the high-tech-dependant, United States. Initially the concerns were of a cyber attack, an attack which could result in denial of service, system malfunction or unauthorized intrusion. Such an attack could be the result of a domestic hacker or an employee upset with working conditions. Now, the threat of a cyber attack is much more prevalent and the damage could be on a much larger scale and could manifest in the form of cyber terrorism. The threat of cyber terrorism has grabbed national attention, either by the media, the information technology (IT) industry, journalists, politicians or experts elsewhere.…

    • 1710 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    In 1995, President Bill Clinton issued a presidential decision directive, ordering agencies of the executive branch of government to prioritize resources devoted to combating the threat of global crime, improve internal coordination, collaborate with other governments to develop a global response, and aggressively and creatively use all legal means available to combat…

    • 1073 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cyber Terrorism

    • 821 Words
    • 4 Pages

    Cyber terrorist. A cyber terrorist is an expert well informed and equipped with the necessary tools to gain control of especially the countries information systems like the defense infrastructure. These are external stakeholder that plays only a negative role in cyberspace and thus a top priority security threat in any countries setting.…

    • 821 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    98.stm (Accessed on July 23, 2010), Brookes, A. (2009). US Launches Cyber Security Plan. BBC News. [Online] (Updated on May 29, 2009) Available at http://news.bbc.co.uk/1/hi/world /americas/8074836.stm (Accessed on June 29, 2010)…

    • 8794 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    Cyber Intelligence Sharing and Protection Act The Cyber Intelligence Sharing and Protection Act or CISPA is legislation that is currently being resurrected in the House of Representatives after failing to make it to a vote in the senate last year as reported as previously threatened with veto by President Obama.(WILHELM, 2013). According to the bill’s author, as reported by Wilhelm (2013) the bill aims to allow more sharing of “cyber threat intelligence” between the U.S. government and private sectors.…

    • 276 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Chinese Defense Science and Technology Information Monthly Issue 121, 5th Issue of 1998 The advent of the Internet has been one of the most exciting major events in the second half of the 20thtcentury. The ancient dream of “a scholar knows all things happening in the world without venturing outdoors” has finally become a reality. Since 1993, the Internet started to take off. At present, the Internet has spread to more than 180 countries and regions, connecting more than 600,000 domestic networks of various types, hooking up more than 20 million computers available to 120 million users (2% of the entire global population). However, due to its innate transnational, decentralized, open and unregulated nature, the Internet as a free, open and anarchic device has brought various countries great risks…

    • 773 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The guidelines for the new cyber-strategy were laid down in 2010 in the government’s broader Security Strategy for Society and the European Union’s Convention to counter cyber threats.…

    • 350 Words
    • 2 Pages
    Good Essays