Preview

Human factors and cyber policy

Powerful Essays
Open Document
Open Document
4860 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Human factors and cyber policy
TA#2 Human Factors and Cyber Policy
CSEC 620
April 27,2013

Table of Content
IntroductionCopyright, threats and ownership of intellectual property
-Important Security Issues
-Recommended Policy Controls
-How/Why Human Factors Influence Policy
Meta-Data collected and used by the Private sector and Public sector
-Important Security Issues
-Recommended Policy Controls
-How/Why Human Factors Influence Policy
Zero Day Exploits employed for economic or military advantage
-Important Security Issues
-Recommended Policy Controls
-How/Why Human Factors Influence Policy
Vulnerability assessments for Mobile Devices in the BYOD environment
-Important Security Issues
-Recommended Policy Controls
-How/Why Human Factors Influence Policy
Conclusion

Introduction
Human factors can influence policy choices for both domestic and international cybersecurity issues. What will be discussed in this paper is how human factors can affect four selected cybersecurity issues. The four-cybersecurity issues selected are zero-day exploits, meta-data collected and used by private and public sectors, vulnerability assessments for mobile devices in the BYOD environment, and threats to copy right and ownership of intellectual property. This paper will go into details on important security issues, recommended policy controls, and how or why human factors can influence each of the recommended policy controls for each of the four selected topics mentioned.
Copyright, threats and ownership of intellectual property
Important Security Issues
With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs.
There are six ways that intellectual property theft harms



Cited: 4. ”A clear-eyed guide to Android 's actual security risks." InfoWorld. N.p., n.d. Web. 27 Apr. 2014. <http://www.infoworld.com/d/mobile-technology/clear-eyed-guide-androids-actual-security-risks-232034>. 5. Graf, O. P. (2013, April 12). The Physical Security of Cyber Security. Retrieved from http://vpnhaus.ncp-e.com/2013/04/12/vpns-and-common-sense-policies-make-byod-safer/ 6 7. History of the Internet Piracy Debate. (2011). Congressional Digest, 90(9), 258-288. 8. NILL, A., SCHIBROWSKY, J., & PELTIER, J. W. (2010). Factors That Influence Software Piracy: A View from Germany.Communications Of The ACM, 53(6), 131-134. doi:10.1145/1743546.1743581 8

You May Also Find These Documents Helpful

  • Better Essays

    Cyber space is any area where data and information is electronically stored or filtered through that can be accessed via a variety of networks, programs, and systems. Cyber is all measures put in place to ensure appropriate use and protection for that information. It is important for organizations to ensure their networks and components within those networks are secure. Each connection to the internet, and each user of the network is a vulnerability to that network. In today’s economy with corporate scandals, government crackdowns, financial cutbacks, and new implementation of policy the single most important vulnerability facing IT managers today is the idea of bring your own device (BYOD).…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    Sunica Music and Movies is a company that currently has four locations. This business is ready to improve the way they do business by implementing a computerized network that will allow for centralized accounting and inventory as well as starting a web-based e-commerce site. The following document provides an in-depth look at the implementation of policy and procedures that will help this transition to become successful.…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Music Piracy

    • 2100 Words
    • 9 Pages

    "File-Sharing: It 's Music to our Ears: Making P2P Legal." EFF. 28 Apr. 2006. Electronic Frontier Foundation. 1 May 2006 .…

    • 2100 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Temple, L. (2010). Piracy: It’s wrong, don’t do it (Pt 1). Retrieved on May 2, 2010…

    • 1054 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cis 324 Computer Ethics

    • 2262 Words
    • 10 Pages

    In the short time that computers and internet have existed in the modern era, the world has seen a complete 360 degree turn and in the various forms of electronic entertainment that people all over the world are now using. In the days before CD’s, DVD’s and the internet, not much was said if a vinyl album (remember these?), VHS cassette (or these?) or an audio cassette was loaned to a friend for their listening / viewing pleasure, but today with the availability of sending an email with three or four megabytes (mb) of information, one can enjoy a borrowed song but is assumed that it is piracy or stealing. Is this a fair assumption? This Author will not give his opinion but rather discuss both sides of the Peer to Peer (P2P) downloading and sharing issues and let the reader form their own opinions.…

    • 2262 Words
    • 10 Pages
    Better Essays
  • Good Essays

    The internet has allowed a proliferation of other forms of file sharing. People can share digital files either in an open system, where anyone can access them, or in a restricted was that allows access only to certain people. This technology also poses great risks to copyright. When a person makes a product that is subject to copyright; that is, another person cannot copy it without permission from the original producer.…

    • 2970 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    Film Piracy

    • 404 Words
    • 2 Pages

    Film and Music piracy by definition is the illegal copying of movies and music videos for personal or commercial use. This is a new epidemic that is effecting the film industry financially on a global level. What are the necessary steps that can be taken on behalf of the film and music industry that can stop this illegal practice from occurring? Once you walk down the city streets like Petaling Street, you can easily find vendors selling their bootleg DVD copies of new released movies for half price of a movie ticket. Movie companies are the ones suffering the most from this illegal practice. This essay takes a look at the different organizations, such as MPAM (Motion Picture Association of Malaysia) and its international counterpart, MPA (Motion Picture Association) are doing to combat this illegal practice.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    E-Piracy

    • 517 Words
    • 3 Pages

    References: [1] Conner, K.R. and Rumelt, R.P. Software piracy: An analysis of protection strategies. Man. Sci. 37, 2 (1991), 125–139.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Is Music Piracy Stealing?

    • 1005 Words
    • 5 Pages

    For centuries, the term piracy calls forth an image of a plundering character that can be found in one of today’s most popular movies, Pirates of the Caribbean. But over recent decades, the term piracy has evolved into one who infringes copyrighted material. Instead of that dirty one-eyed pirate with a wooden peg leg and cutlass sword, the pirate now can be anyone, any size, any age. Charles Moore wrote the essay, “Is Music Piracy Stealing?”, and tried to answer his own question. Moore started off by explaining that current day pirates simply do not care about copyright laws. He goes into detail about the philosophy, ethics, and morality of the threat of the free exchange of information over the Internet. Moore’s argument is that piracy is a victimless crime and that laws must change along with technology. But does he convince us all that music piracy is in fact stealing? No, he doesn’t, because even if the information comes from statistics, the question of music piracy will always be an opinionated answer.…

    • 1005 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Of all controversies surrounding digital copyright laws on the Internet, the Napster lawsuit has received the most media attention because of its wide popularity and revolutionary approach to file sharing. The Recording Industry Association of America (RIAA) is suing this Internet service for "lost revenue" from songs Napster users downloaded for free using its services. As the RIAA represents major record labels such as Warner Brothers, this lawsuit represents the first major copyright litigation brought against an Internet service. In addition, this lawsuit has many implications for other laws governing the Internet, not just those pertaining to copyright infringement. This case is forcing America and other countries to think about the laws that govern the relationship between companies that provide Internet services and ones that provide Internet content.…

    • 1784 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    A New Age of Music Piracy

    • 1946 Words
    • 8 Pages

    Fetscherin, Marc, and Sabrina Zaugg, "Music Piracy on Peer-to-Peer Networks," eee, pp. 431-440, 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE '04), 2004.…

    • 1946 Words
    • 8 Pages
    Powerful Essays