Based on the organization you have chosen for your final research paper:
Business Case: Provide details about the organization you have chosen for your scenario and relevant information about their
1. Organizational Structure As of 2014 the United States had total population of 318 million and 277 million Internet users (United States Internet Usage, Broadband and Telecommunications Reports – Statistics, 2014). Most large communications companies have their own devoted backbones linking numerous areas (Tyson, 2001). In each area, the company has a Point of Presence (POP), which is a locality for local users to access the provider’s network, usually via a local phone number or dedicated line (Tyson, 2001). The amazing thing here is that there is
…show more content…
Current State of Security that motivates your project (if your project is in response to new risk introduced by another initiative in the organization, then explain the business case that is motivating your project in response). This section will be supplemented by your risk assessment in M4. If your project is because of gaps that introduce risk in your current environment, provide a business case for why there are gaps and how your project is needed to address those gaps. It is likely that something happened over time to get to the state you have today (it could be evolving technology, increased business demands, etc.) When all is said and done, the United States Internet is fully exposed to any threat from outside the country’s borders. What security that exists relies solely on independent security methods, be them from the United States government, from private companies, or just individuals. As has been noted recently, all these have failed miserably, be it China’s stealing of millions of records from the United States Office of Personnel Management (Gertz, 2016), January, to the Sony hack by the North Korean’s (Elkind, 2015) and have demonstrated the total lack of needed national Internet boundary
The Internet was first used in the nineteen sixties by a small group of technology professionals. Since then the internet has become an essential part of today’s world, from communicating through texts and emails to banking, studying, and shopping, the internet has touched every aspect of our lives. With the growing use of the internet, protecting important information has become a must. While some believe they have the right to privacy, and feel that the government should not be at the center of their lives. Others feel that the Internet has evolved into a weapon for our enemies, and believe the government must take action by proactively
Over the last several years, cyber attacks have been continually rising. This is in response to emerging threats from rogue nations and terrorist groups. They are increasing their attacks on government, military and civilian installations. According to James Clapper (the Director of National Intelligence) these threats have become so severe. It is surpassing terrorism as the greatest challenge facing the nation. In response, the National Security Agency (NSA) began conducting surveillance on those who are involved in these activities and others which are threat to US national security interests. This program became so broad; it started continually collecting phone records and emails on ordinary Americans. This angered many, who felt that the US was acting in a way that circumvented established legal guidelines and procedures. To fully understand what is taking place requires focusing on the event, the government 's response and the ways it did / did not meet our national security goals. Together, these different elements will illustrate what occurred and the lasting impacts on everyone. (Greenwald 2014)
For over two centuries American citizens have bided by the first 10 commandments in the United States Constitution, otherwise known as the Bill of Rights, for protection over their personal liberties from the United States government. These personal liberties include, but are not limited to: The freedom of religion, speech, and press, the protection of privacy, and the right to life, liberty, and property. These personal liberties protected by the government, from the government, have always been strictly enforced with no unknown territory. That is until approximately three decades ago when the Internet was created. Over the last twenty-seven years technology has been quickly advancing creating an unknown world of the Internet and
The integrity of one’s communications and privacy of online activities is the largest casualty of the National Security Agency’s (NSA) surveillance over digital lives. Years since September 11, 2009, the NSA’s mass surveillance has greatly expanded due to the heightened concern that new technology can be used by terrorists to plan and execute a terrorist attack. In today’s age of technology, there are easier ways of accessing information and communication as well as new ways of hacking and gathering personal information. The new surveillance programs and regulations are enabled by the Patriot Act and post 9/11 paranoia, but it has been over fourteen years since the incident. After whistleblower, Edward Snowden, it was revealed that the government’s mass surveillance went beyond what many considered acceptable. It can be predicted that unless the U.S Government reins in NSA mass surveillance, the
The Federal Communication Commission has a duty to promote internet security and a secure environment of communication networks, including the internet. Due to online transactions, people working from the internet and the digitalization of documents, sensitive personal information is frequently transmitted online. The order address this, “the Commission recently took enforcement action under section 222 (and section 201(b)) against two telecommunications companies that stored customers’ personal information, including social security numbers, on unprotected, unencrypted Internet servers publicly accessible using a basic Internet search” (FCC, 16). Also, the order encourages and demands broadband providers to maintain standard security protocols (FCC, 34). Furthermore, the order states that laws and regulations must be consistent, “to address the needs of emergency communications or law enforcement, public safety, or homeland or national security authorities” (FCC, 132). All of these points illustrate that security of networks, personal information and national security are top priorities of this order and that of the Federal Communication Commission. It is my belief that the commission does an effective job of address security
There is no doubt the privacy of our online activities and the integrity of our communications have been the biggest casualty of the NSA’s surveillance of our lives. Although ongoing revelations of government eavesdropping have had a profound impact on many different aspects in life. The NSA must balance out their interference with citizens lives because it’s undermining the government's leadership on internet safety, deteriorating internet security, and is causing economic losses to U.S. businesses due to decreasing customer trust.
Cyberterrorism is a critical threat and is the most definitive characteristic of the U.S. contemporary security environment. For years, the American people have been victimized by cyber-attacks by having their personal information, emails, credit card, and banking information stolen by an invisible enemy named cyberterrorism. These types of attacks seem insignificant however; they are small examples of the vulnerabilities that our cyber world is experiencing. Our vulnerabilities are leaving our public officials in significant danger from cyber-attacks, as they are vulnerable to such things as the release of personal information and home addresses.
On February 12, 2015 president Obama signed an executive order with the intention to expand the Cybersecurity of the U.S. and to promote principles of collaboration not just in America but around the globe. Cybersecurity has been identified as one of the most challenging subjects of the 21st-century; moreover, cyber-attacks can further compromise the future of our economic development as much as our national security and the decrement of our civil rights and privacy. Since Obama initiate his administration, he has been working on establishing the framework to better balance the interaction between, government agencies, private sector, and the general public. The objective in this essay is to better understand the connotations from several
* There are three (3) schools of thought regarding risk. The first considers the positive and negative aspects of risk, but sees them as separate. The second group believes that there are benefits from treating threats and opportunities together, while the third school does not label uncertainties, but addresses uncertainty as part of “doing the job.” Argue the value of having a risk strategy despite the cost associated with it. Include an example to support
The internet is a vast global interconnected network enabling numerous people to access countless information and communicate with others miles away. When browsing the web nowadays, however, many forget what’s really happening behind the scenes. Internet cookies and complex algorithms are being downloaded behind your back allowing big brand companies and even the federal government to track what the people are doing. This is a major violation to our right to privacy which is implied in the Constitution.On the other hand, it’s understandable for the government to have a substantial amount of surveillance of the internet to monitor terrorists and people seeking to cause harm, but the extent the US government controls over the web is absurdly large and unnecessary. Overall, surveillance and order must be maintained throughout the internet to deter fanatics intending to cause harm, but the United States government have increased their range so wide it has
" The United States government has a responsibility to ensure that every American has access to an internet that has a freedom of information. The internet has become a necessity in our everyday lives. School age Americans use the internet for research projects and even to submit homework. A vast majority of working-age Americans use the internet for the jobs or are involved in producing the inputs necessary to advance technology and keeping the current technology infrastructure working. The U.S. government has a limited duty in monitoring internet content. The government should have the ability to protect Americans from cyber acts and personal information theft. Currently the Federal Trade Commission has the power to regulate the internet
The Internet is one of the most popular and important creation ever as of today. It’s a convenient way to socialize, shop, stay update with news and many more. After reading the essay by Bruce Schneiser’s “The Internet Is A Surveillance State,” it has changed my thoughts on how I view the internet. Bruce Schneiser posted this essay on cnn.com on March 16,2013 to bring awareness of the surveillance internet.
In November 2015 an accord was reached with Tehran to limit its ambitions to proliferate atomic weapons, four months after the agreement, American officials noted a surge in the use of sophisticated computer espionage by Iran (Sanger&Perloth, 2015). Iranian hackers targeted individual U.S State Department employees who focus specifically on Iran and The Middle East, hackers gain access to the employees’ email accounts and other social media accounts. They had no idea that that this had happened until Facebook notify the victims that state-sponsored hackers had gain access to their accounts. Iran’s cyber skills capabilities are not equal those of China or Russia, though hacking social media accounts of government works to gain access to their contacts in the administration had not seen before by either China or Russia (Sanger&Perloth, 2015). This action shows ingenuity way beyond Russia’s hacking to The State Department’s unclassified email system (Sanger&Perthloth, 2015).
Every state in the nation should have a comprehensive IT security policy due to the “growing array of state and non-state actors are compromising, stealing, changing, or destroying information and could cause critical disruptions to U.S. systems” ("Cyberspace policy RevIew", 2016). Because of “ the dual challenge of maintaining an environment that promotes efficiency, innovation, economic prosperity, and free trade while also promoting safety, security, civil liberties, and privacy rights” ("Cyberspace policy RevIew", 2016). It is the responsibility of state and the federal government “ to address strategic vulnerabilities in cyberspace and ensure that the United States and the world realize the full potential of the information technology revolution” ("Cyberspace policy RevIew", 2016).
POP – point of presence is where the telephone company will hand its service off to a subscriber.