Technology and the Impact of Cyber Security
Cyber security is one of the most significant issues facing world leaders today. Besides, threats from cyber attacks pose serious challenges to global network. In fact, most governments recognize the need to implement cyber security in Information and Communications Technology (ICT) systems. Cyber security is important because it ensures security of information. ICT systems encompass various aspects of the government. For instance, ICT systems cover national security, well being and economy of the government. Essentially, cyber security ensures that reliable information is relayed to the right systems. Notably, Australian authorities are increasing awareness on cyber crimes. Additionally, governments across the world are increasing awareness on cyber attacks. Particularly, governments try to mitigate on cyber crimes by upgrading their defense systems. These actions are aimed at achieving safe and reliable ICT systems. However, governments also face obstacles in their efforts to achieve resilient ICT systems. This paper will provide a literature review on technology and the impact of cyber crime (Australian Government, 2009). Cyber security is a term coined by computer scientists. It refers to security of computer systems. Cyber security involves protection of information, which is transmitted through the computer. The term cyber security was coined in the 1990s. Computer scientists were keen to outline challenges of networking computers. Cyber security presents numerous threats to computer systems. These included threat to organizations as well as threats to individuals. Cyber criminals may target any or both organizations and individuals. Cyber security tries to minimize attack on computer systems. Additionally, it tries to assure organizations and individuals of the safety and privacy of their data. Cyber criminals targeting national issues tend to attack government systems. Consequently, each government tries to avert such attacks in the best possible manner. Governments hold top security information that must be transmitted in a safe and reliable manner. This information is usually the target for some cyber criminals with the aim of leaking such information to the public (Georgia Tech., 2012). To achieve cyber security in a constantly changing technological world, devices utilized to store or transmit information should meet security compliance standards as stipulated by the organization in charge of cyber security. It has been established that cyber security poses grave dangers to productivity and economy of health sector. Moreover, cyber crimes pose threats to national security, banking systems and personal security. In this regard, cyber security can be considered to encompass aspects of confidentiality, integrity as well as availability of data (Bamrara, Singh & Bhatt, 2013). Data can be transmitted electronically, or by other means which are similar. Australia’s national security statement mentioned cyber security as significant to its social well-being, economic prosperity and national security. ICT devices include internet, mobile communication devices, desktop computers, laptops, networks and telecommunications, among other computer systems. Australia is known to be susceptible to intrusion by cyber criminals with intent of spreading malicious codes. Moreover, complexities involved in identifying potential threats have slowed mitigation of cyber crimes (Grauman, 2012). Cyber security was decades old before it was coined by computer scientists. Issues related to cyber were dawning at a time when their solutions were limited. It was then considered in policy making for governments. In essence, results of earlier debates on cyber security led to its emergence in mid 1990s. In 1945, Hopper saw a cornered moth in transmitters of a computer belonging to the Navy. She called it a bug. Since then, scientists have utilized the term to illustrate...
References: Australian Government (2009). Cyber Security Strategy: An Overview. Retrieved from http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/Cyber%20Security%20-%20An%20Overview%20 (Brochure-Booklet).pdf
Bamrara, A., Singh, G., & Bhatt, M
Boateng, R., Olumide, L., Isabalija, R., & Budu J. (2011). Sakawa - Cybercrime and Criminality in Ghana. Journal of Information Technology Impact, 11(2), 85-100.
Daryabar, F., Dehghantanha, A., Udzir, I., Sani, N., Shamsuddin, S., & Norouzizadeh, F. (2013). A Survey about Impacts of Cloud Computing on Digital Forensics. International Journal of Cyber-Security and Digital Forensics, 2(2), 77-94.
Georgia Tech. (2012). Emerging Cyber Security Threats Report 2013. Retrieved from http://www.gtcybersecuritysummit.com/pdf/2013ThreatsReport.pdf
Hansen, L. & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175.
Kleiner, A., Nicholas, P., & Sullivan, K. (2013). Linking Cybersecurity Policy and Performance. Retrieved from http://www.gwumc.edu
Leukfeldt, R., Veenstra, S., & Stol, W
Ponemon Institute (2012). The Impact of Cybercrime on Business: Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil. Retrieved from http://www.ponemon.org
Sommer, P., & Brown, I
Suffolk, J. (2012). Cyber Security Perspectives: 21st Century Technology and Security – a Difficult Marriage. Retrieved from http://www.huawei.com
Please join StudyMode to read the full document