Preview

Cybersecurity Resolution

Powerful Essays
Open Document
Open Document
3606 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybersecurity Resolution
INTERNATIONAL
MODEL UNITED NATIONS CONFERENCE (2013)
GENERAL ASSEMBLY MAIN SUBMITTER: The Kingdom Of Denmark
CO-SUBMITTERS: The State of Japan,
SIGNATORIES: The Kingdom of Saudi Arabia, The French Republic, The Republic of the Philippines, Democratic Republic of Algeria, The Russian Federation, The Republic of Croatia, The Republic of India, The Republic of Tunisia, United States of America, The Islamic Republic of Afghanistan, The Argentine Republic, The Commonwealth of Australia, The Republic of Azerbajian, The Kingdom of Bahrain, The People’s Republic of Bangladesh, The Kingdom of Belgium, The Federated Republic of Brazil, The Kingdom of Cambodia, Canada, The Republic of Chile, The Republic of Colombia, The Republic of Croatia, The Republic of Cuba, The Czech Republic, The Democratic People’s Republic of Korea, The Democratic Republic of Congo, The Arab Republic of Egypt, Georgia, The Federal Republic of Germany, The Republic of Ghana, The Republic of Guatemala, The Republic of Indonesia, The Islamic Republic of Iran, The Republic of Iraq, The Republic of Ireland, The State of Israel, The Italian Republic, Jamaica, The Republic of Kenya, The State of Kuwait, Laos, Libya, Luxembourg, Malaysia, Mauritius, Mexico, Morocco, Namibia, Netherlands, New Zealand, Nigeria, Norway, Pakistan, Paraguay, Peru, Poland, Portugal, Qatar, Republic of Korea, Rwanda, Serbia, Spain, Sri Lanka, Sudan, Sweden, Switzerland, Syria, Thailand, Togo, Turkey, Uganda, Ukraine, UAE, UK, US, Venezuela

TBC

Resolution by the General Assembly
Bearing In Mind previous United Nations resolutions on the issue, such as, but not limited to, A/RES/55/63, A/RES/56/121, A/RES/57/239, A/RES/58/199, A/RES/64/211, and the methods and means in which they deal with the issue, and the obligations placed on member nations,

Deeply concerned that the prevalence of the use of the Internet for terrorist purposes is a rapidly growing phenomenon that will pose as a threat to many other

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a resolution of the member governments of the Organization of Economic Cooperation and Development (OECD)…

    • 640 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Best Essays

    Over the past couple of decades America has been fighting against the growing threat of terrorism. As the new millennium unravels, the age of the computer dawns the terrorists are beginning to fight on a different mainframe: the computer. The latest threat to U.S. intelligence is not terrorist attacks anymore, but cyber terrorism. As your Special Advisor on cyber security and cyber terrorism, I can prevent terrorist from all over the world from causing damage to our country.…

    • 613 Words
    • 3 Pages
    Best Essays
  • Best Essays

    Davidson, J. W., Brian, D., Heyrman, C. L., Lytle, M. H., Stoff, M. B. (2008). Nation of nations:…

    • 4532 Words
    • 19 Pages
    Best Essays
  • Good Essays

    There are numerous challenges emerging in homeland security. In my opinion, one of the biggest challenges is how the Internet is used. The Internet is being used by terrorist groups worldwide to spread their propaganda. These groups are using ungoverned Internet space to disseminate training material and poisonous propaganda to attract and lure individuals from around the world to their cause. They encourage these individuals to commit acts of violence in their own communities. These terror groups have used the Internet to provide these individuals vital training and information in the privacy of their own residence. With the Internet, these individuals no longer must travel out of country to obtain the training.…

    • 334 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In “Terror on Facebook, Twitter and YouTube” Gabriel Weimann argues that social media has greatly aided the spread of terrorism over the advancement of technology in online communication. Weimann examines the use of interactive online communication by terrorists and their supporter- from chatrooms to social media and online video communities.…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Davidson, J.W, DeLay, B. Heyrman, C.L., Lytle, M.H., Stoff, M.B.( 2008) Nations of Nations: A…

    • 2748 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Today the internet has completely changed the way people communicate with each other. It has changed the people conduct commerce, changed the way people research topics, the way people entertain and the way people break the law (Schmalleger, 2011, p. 70). Many of the crimes that are committed on the internet include: prostitution, drug sales, theft, fraud, conspiracy, bullying, and harassment. As the internet becoming more and more of a dominator factor in how society is driven so has these crimes. Kids are being bullied and harassed by their peers to the point that they are committing suicide. Stopping these acts are hard because it’s very difficult tracking everyone in America’s computer and it’s illegal without the correct warrant and process to monitor someone’s actions. The more that the internet becomes an everyday use for everyday America the more is going to be taken advantage of and break the law. I can see this being beneficial or detrimental to society as a whole. It can be beneficial by connecting the world but also detrimental by someone corrupting and hacking into the world. It’s going to be on the government and us to see how this outcome turns…

    • 1059 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    One of the prime uses of the internet by terrorists is for the propagation of propaganda. Propaganda usually takes the form of multimedia communications providing ideological or practical instruction, clarifications, justifications or promotion of terrorist activities. These may include computer-generated messages, presentations, magazines, treaties, audio and video files and video games advanced by terrorists’ organizations or sympathizers. Nevertheless, what constitutes terrorist propaganda, as opposed to legitimate advocacy of a viewpoint, is often a subjective valuation. Further, the distribution of propaganda is generally not, in and of itself, a prohibited activity. One of the basic canons of international law is the protection of fundamental…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Terrorism is one of the most remembered and feared occurrences in the world. Terrorism changes the lives and hearts of everyone that it affects. This paper explores the different types of terrorism, who commits the acts, how it affects the surrounding world, and what can be done to prevent it. This review of the different types of terrorism focuses primarily on the specific types of terrorism. This paper then tries to relay to the reader the understanding of all types, and the differences between them.…

    • 1251 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Pew Research Center has concluded, through polls, that an overwhelming eighty-two percent of people believe that it is acceptable to monitor terrorism suspects’ internet activity. The same set of polls also reveals that seventy-seven percent of Americans believe it acceptable to monitor users who visit child pornography sites. These numbers suggest a majority of American citizens faced with situations showing clear imminent danger or illegal activity are, decidedly, for government internet monitoring. This revelation leads to the one of the most dire questions of the rise of the new generation: to what extent do we as American people allow our own privacy to be violated in order to protect public and national security? The answer to this question is strikingly less simple, and for a majority of the public, fifty seven percent according to Pew Research Center, the idea that the government should monitor ordinary citizen’s internet usage is…

    • 687 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ECOSOC 2014

    • 587 Words
    • 2 Pages

    The next resolution was submitted by the delegates of the Bahamas , Gambia , Guyana , Iran , Vanuatu and Myanmar together which…

    • 587 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Empower Girl Child

    • 3507 Words
    • 15 Pages

    * The views expressed in this paper are those of the author and do not necessarily represent those of the United Nations…

    • 3507 Words
    • 15 Pages
    Powerful Essays