Free Essay

Private Sector-Public Sector Cybersecurity

In:

Submitted By atb689
Words 2081
Pages 9
Private Sector-Public Sector Cybersecurity Issues
Andrew T. Bouley
Professor: Choi
6/28/2015

Table of Contents

I. Question 1 1. Introduction ………………………………..….………………………………………..3 2. Uber……………………………………………….…………………………………….3 3. Google ……………………………………………………….………..……………..3-4
II. Question 2 1. Internet Privacy…..…………………….……………………………………………… 4 2. Shopping Choices……………….……………………………………………….….. 4-5
3. Lifestyle Habits………………………………..………………………………………. 5
III. Question 3 1. Geographic Location……….………….……………………………………………… 6 2. Terms and Conditions………………...……………………………………………...6-7
IV. Question 4 1. Public Support………………………….……………………………………………… 7 2. Private Support….……………….………………………………………………….. 7-8
V. Question 5 1. Human Involvement……..…………….……………………………………………… 8 2. Marketing Strategies…………….…………………………………………………….. 9
VI. References 1. Rijmenam, M….……………………………………………………………………... 10 2. Hirson, R…………………………………………………….……………………….. 10 3. K.N.C. ……………………………………………………………………………..… 10 4. Hattem, J. .……………………………….………………………………………….. 10

Local restaurant recommendations, personalized ads, enticing offers that seem to be the perfect suggestion. It is fairly common for these types of scenarios to take place and it all is thanks to Big Data. Big Data allows companies to catalog and mine through huge amounts of web files to help them understand their clientele, competitors, and even in Google’s case the web itself. Most large companies seem to love it; it makes their lives easier, marketing simpler and their suggestions more meaningful, however that isn’t always the case with the general public. Before delving deeper one needs to understand why a company needs this type of data, the two companies to be analyzed will be Uber and Google.
Uber has recently been growing into a very large contender in the Big Data market. Their first use benefits themselves directly, Uber has information on all if its drivers, where they live, where they travel, where they eat as well as the type of car they travel in depending on the fare price. Uber can then use this information to ensure they have the right types of drivers in the right area. Their second benefit comes from being able to sell this data to potential partners who may be interested in the same facts. For example Marriott may be very interested to know that someone allows visiting DC by Uber Black Car typically stays at a Hyatt. When Uber partners with a business they can receive customer approval to share data and create wonderful marketing partnerships.
Google on the other hand uses Big Data as its main function. Google uses big data to index pages and crawl the web in order to build the most comprehensive search platform available that acts more like a human mind than a search program. Big Data not only allows Google to function but also generates a lot of their income. Google is able to track everything that a user searches for when they are on the web and when the user is signed into Google+ they are able to log that information to your account. Google then can take this information and sell it to their partners who offer personalized ads to the user. Big Data ensures that when using Google the user will have a tailored browsing experience based of their previous usage. This is a very important factor when Google is looking to sell marketing at a high dollar to other interested companies.
Google’s use of Big Data may seem harmless at first but in reality it can harm users in multiple ways. The first is that when custom tailoring a web search to the users previous web experiences they may be missing out on new and interesting opportunities. As a comparison if an individual eats at a restaurant and receives the same server every time and that server always recommends the same dish to the based of the customers previous taste they may never find something that they like even more or that could possibly generate even more revenue. The results that Google provide are also based on the amount of money that the marketing company is willing to provide, which means that smaller companies do not stand as much of a chance as being successful. (Rijmenam, 2015)
Big Data can also be pulled based on content, which means that websites that are not as modern and without as large of a budget may not be crawled and presented as sufficiently as other larger websites. The final way that this can hurt the user is through constant adds being displayed while on the Internet. This is mentioned last as adds would be available regardless, but Google’s policies all but ensure other companies will purchase space to make their adds available. Google’s Big Data use not only allows them to function but drives a lot of their profit and the harm to the user is minimal however the harm to smaller less mainstream business is much more noticeable.
Uber has a larger downside to the customer as the privacy breach has grown substantially. Instead of a company knowing what a user is searching for they can have access to a customers location, spots the frequent, the amount of money they are willing to spend on travel and much more. It should be noted that a customer needs to agree to these terms before releasing that information, however, most customers do not even consider this when clicking the submit button. Ron Hirson of Forbes validates this point by stating that there are only a few people that know his exact location on a regular basis and that Uber has recently been added to that list which previously only involved his wife, SIRI and the NSA. He mentions the fact how unsettling it can be to know that Uber knows when he leaves one state to travel to another for work and with which hotel he is staying when he arrives. After Starwood partnering with Uber, he notes that a stay in a competitor hotel usually earns him a drawn out marketing plot by Starwood to sway him the other way on his next stay. (Hirson, 2015)
Privacy has become a large problem for the public recently and with companies like Uber being able to provide that type of data on an individual it sparks a lot of debate on how the Government should respond and regulate control. The first way that I believe Government should step in revolves around geographic location. Companies such as Uber and Street Bump, an app that uses your smart phone to indicate potholes in the road by large bumps, rely on location to be successful, but it can be said that this hurts the underprivileged areas where individuals may not be able to afford smartphones, this put the users who do have the luxury of a smartphone out of luck for a lot of potentially great services. (K.N.C., 2014)
I believe that on the ideal of equality companies should be restricted from collecting geographic location and using it to influence their technology or the services of another organization. From the previous example with street bump it was noted that areas that did not have access to smartphones were suffering from rougher roads since this information could not be relayed back to the city. This also hurts smaller business that are not able to spread their reach as far as larger big box stores that can pay the marketing and place down new stores based of the information they are buying from companies such as Uber. If the government prevented the use of location to influence business these situations would not be an issue. (K.N.C., 2014)
The second space where the Government has an opportunity to step in is with the Terms and Conditions acceptance. K.N.C. of The Economist argues that the government should enforce regulation to create a more concise and easier to understand terms and conditions section that highlights the main points. This would allow the public to understand exactly where this data was being used and how it was being retrieved.
Lawmakers have taken a growing interest in Big Data as it is becoming more publicly recognized and as privacy has become a larger national concern. Politicians have a tricky role to play, as they need to be on the side of the public since they are the voting body, but they also want to be on the side of the big business and private industry since they are the ones that provide a lot of their funding for their campaigns. The public likes to see the Government step in and protect them from big business and on that note Lawmakers are trying to ensure that they provide regulation to govern the privacy of their voting congregation. They have even gone so far as to make it one of their selling points by indication that Big Data is being used for discrimination. Representative Jim McDermott said, “Now, we learn that data collected by the private sector could be used to discriminate against vulnerable individuals…I will be calling for further investigation into this urgent issue. 'Potential discrimination' is intolerable and I am concerned that this news may be just the tip of the iceberg.” (Hattem, 2014) Statements like this require the other politicians to react and either take the same or opposing side, where in the name of public privacy most will side with the public. All of the above being said, politicians still want to ensure they do not restrict Big Data too much as a lot of their funding comes from companies that use these tactics in order to be successful. If they were to restrict Big Data too much there would be a possible cut in support from the industries that rely on it so heavily, which in most cases is the largest and most profitable. For politicians, it makes sense for them to stay on the middle ground and not provide any drastic changes. If tighter regulations do emerge it will cause companies that rely on Big Data to change the way that they operate. The first change will be the introduction of more staff. Big Data retrieval is a mostly automated process that can sift through huge amounts of data in a time that not even the most experience team could match. This means that companies will need to rework their marketing departments as well as their R&D sections to ensure that they are following the new laws properly. This type of change could also create a lot of harm to companies such as Uber that do not have the current space of plan to include a larger number of staff members. Since a lot of their new business is coming from the sale of information and partnerships formed around the information they possess it could even require the drastic change of a business model. Tighter regulations could also affect the way that many organizations today are currently marketing. If they do not have the ability to provide advertisements to the customers that are actively searching for related products in the surrounding area or on the web they will need to revert to previous tactics. Although this will hurt the larger big box companies it could, in fact, provide the smaller business an equal chance to gain the same business. Big Data has provided a lot of companies with a very easy and thoughtless plan to market their business on the web, but much of that could be changed with the introduction of a few laws. Big Data definitely has the opportunity to create a lot of tension in the future especially from the standpoint of the public vs. Large Businesses looking to sell their data. But, there is also a potential to see frustrations begin to emerge from small business owners that do not have the resources to buy into the trend or the knowledge to do it for themselves. The Government is going to have to make a decision on if they are going to want to stand on the side of businesses that use Big Data to create revenue or with the public that believes they are in an unfair situation where their privacy is at risk.

References

Rijmenam, M. (2015) How Google Applies Big Data to Know You Retrieved from: https://datafloq.com/read/google-applies-big-data-infographic/385
Hirson, R. (2015) Uber: The Big Data Company. Retrieved from: http://www.forbes.com/sites/ronhirson/2015/03/23/uber-the-big-data-company/ K.N.C. (2014) Rules for The New Tools Retrieved from: http://www.economist.com/blogs/democracyinamerica/2014/05/regulating-big-data Hattem, J. (2014) Lawmakers pledge to dive into ‘big data’. Retrieved from:
http://thehill.com/business-a-lobbying/204500-lawmaker-concerned-by-big-data-possibilities

Similar Documents

Premium Essay

Private Sector-Public Sector Cybersecurity Issues

...Table of Contents Introduction 2 Meta-Data in the Retail Industry 2 Negative Aspects 3 What Should Lawmakers Do? 4 Goals of Lawmakers 5 Possible Outcomes of Cybersecurity Regulations 5 Conclusion 6 References 7   Introduction Meta-data can be described as ‘detailed data which describe other data to obtain a better understanding and achieve better quality of information’ (Beth Haugen, Herrin, Slivochka, McNeil Tolley, Warner, & Washington, 2013). Private companies harvest meta-data to create complex advertising campaigns (Yu, McLaughlin & Levy, 2014). We shall focus on the retail industry, and how companies use meta-data. We shall also discuss the cons if meta-data collection, the responsibility of lawmakers in regulating meta-data collection. Finally, we shall look at the possible effects of cybersecurity regulations of meta-data on the private industry. Meta-Data in the Retail Industry An example of a popular retail store is Target. Target’s goal is to make it the go-to store for all merchandise, by providing great value, innovation, excellent customer service by adhering to their ‘Expect More. Pay Less.’ promise (Target, 2015). Collecting meta-data about customers helps Target to achieve its goal by creating detailed clients profiles, accurate product suggestions, and a quicker online product search and checkout (Milian, 2014). Target uses meta-data from social media to address its innovation goal, by judging the consumers’ reactions to its designer partnerships...

Words: 1653 - Pages: 7

Premium Essay

Cybercrime Law, Regulation, Effects on Innovation

...Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology CSEC 620 9024 Summer Semester May 18, 2015 Table of Contents Introduction 1 The Role of the Government in Protecting National Security 1 Acceptance of Government Intervention on Protecting National Security 2 Reaction to the Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies and procedures for private sectors. The executive branch...

Words: 1899 - Pages: 8

Premium Essay

Private and Public Sector Cyber Security Needs

...Private and Public Sector Cybersecurity Needs George Gritten Table of Contents Executive Summary 3 Introduction 4 The Current State of Cybersecurity 4 The Evolution of Cybersecurity 7 Moving Towards a More Secure Tomorrow 9 Conclusion 10 References 11 Executive Summary Today’s world is quickly evolving into a world that relies solely on technology as a way to do business and communicate. With this move towards a technology-centered society, both public and private sectors have to keep up with and evolve just as quickly, while trying to be proactive when it comes to security. The world today is not as safe as it once was, and as it changes to a more paperless, technological-based society, access to information is becoming increasingly accessible. With this, cyber-attacks and security breaches have become a significant risk of doing business. As hackers, botnets, and various other cyber-based threats have become progressively more malicious and continue to attack organizations and governments alike, a prevailing question is how to unite the public and private sectors so that they can evolve to defend against that which they cannot see. Introduction Today's reality is rapidly advancing into a world that depends exclusively on technology as an approach to work together and connect. With this move towards a technology-focused culture, both government and private sectors are needing to stay aware of and develop almost as fast, while attempting to be proactive...

Words: 2198 - Pages: 9

Premium Essay

Case Study 1: the Critical Need for Information Security Rubrick

...6. Enter your library username and password. Download and read the following articles available in the ACM Digital Library: Bernier, M., Chapman, I., Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation. Proceedings from MMS ’11: Military Modeling & Simulation Symposium. Boston, MA. Maughan, D. (2010, February). The need for a national cybersecurity research and development agenda. Communications of the ACM, 53(2), 29-31. Write a four to five (4-5) page paper in which you: 1. Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization. 2. Analyze and determine which sector, public or private, has greater insight on the potential of cyberattacks. Justify your answer by citing at least three (3) examples. 3. Suggest at least four (4) best practices that should be implemented when developing a cybersecurity strategy within a security enterprise. Then, evaluate the required...

Words: 1615 - Pages: 7

Premium Essay

Csec

...Government Intervening To Protect Our Cyberspace University of Maryland University College Table of Contents Introduction page…………………………………………………………………..3 Justification to Regulate Private Industry Cybersecurity………………………3-4 Real World Threat…………………………………………………………………4-5 Methods for Government Intervention:…………………………………….……5 Government’s Intervention Impacts on National Security………………….….5-6 Real World National Security Breaches…………………………………………6 Arguments of the Private Sector to Take Responsibility.................................6-7 Failure to Take Responsible Action................................................................7 Conclusion…………………………………………………………………………7-8 References.....................................................................................................8-9 Introduction In 1969, the first ever network was born into existence (ARPANET) also called advanced research projects agency network. The Government Defense Department worked diligently on this break through in order to link some of the United States most prominent research universities with a couple of purposes in mind:...

Words: 1747 - Pages: 7

Free Essay

Csec 620 Individual Assignment 1

...IA#1 Cybercrime Law, Regulation, Effects on Innovation John Doe CSEC 620 Section 9022 Note: This paper was submitted through originality check websites. Table of Contents 1. Introduction 3 2. Private Industry & Regulations 4 3. National Security Concerns 4 4. Methods 6 5. Impacts of Government Regulation 7 6. Compliance 8 7. Responsibility 9 8. The Real World 10 9. Conclusion 11 References 12 1. Introduction Cybersecurity and cybersecurity initiatives are commonplace in all aspects of our digital lives. Personal computers are still widely used, especially in the workplace, but mobile devices seem to be the preferred computing choice of the average person. This would include but not be limited to; smart phones, tablets, and laptops to name a few. Mobile devices have changed the digital landscape in a manner that could not have been predicted. This is because other than work or school related activities, most personal computers were used to play a few games, check email, and browse the internet. These activities eventually transitioned over to the aforementioned mobile devices. Now we mix in social media, and a whole new digital cyber-world has emerged. Talk about getting your head out of the clouds. We live in the cloud, literally and figuratively. What does this mean to the average consumer? Perhaps not much. Most people who operate in the digital world could probably care less about the underpinnings of cyberspace and...

Words: 2894 - Pages: 12

Premium Essay

Csec Ia1

...and private industries with various methods and motives behind them. Those various attack methods can make a significant damage ranging from an individual identity theft based scale to national scale concerning its security as a sovereign nation. In other words, cybercrime equally brings serious concerns for both private industries and government. Also, private industries have an interchangeable relationship with government agencies as client to provide services. Most of utilities-related critical infrastructure systems in every city are mostly managed by private organizations. As we are more depending on technological management of such critical infrastructure and centralization of such system throughout the network, cybercrime targeting those critical infrastructures can have detrimental effects for both private and government sectors. There has been a steady increase in numbers of cybercrime with its benefits over the traditional crime in the past decades. Cyber criminals are getting smarter and equipped with more resources with every passing days and are becoming bigger threats. Therefore, it is important to scrutinize those cybercrime-related issues as well as to delve into planning a well-thought out countermeasure for both private and government sectors in various aspects for betterment of safer society of the information era. In this paper, Part I addresses how government intervention justifies telling private industry how to set up or improve their cybersecurity with...

Words: 3978 - Pages: 16

Free Essay

Unit 5 Individual Project

...department as large as the DHS is unable to fully protect the homeland from every threat possible. There is no way to always cover every avenue for potential threat to the U.S. To combat this unfortunate reality, the DHS relies on help from private enterprise. The DHS includes an office, known as the Office of Policy, which includes the Private Sector Office as one of its sub-departments. The Private Sector Office provides the Secretary and Department leaders with advice on issues relevant to the private sector, including academia, non-profits, NGOs, and businesses (dhs.gov). In addition, the PSO helps create and foster strategic communications with the private sector to enhance the primary mission of the Department to protect the American homeland (dhs.gov). This paper will explain the involvement of the Department of Homeland Security with private enterprise via the PSO, explain why this involvement is crucial to the mission, and explain how the DHS uses private enterprise in the protection of critical infrastructure and key resources. This paper will also give examples of programs that address governments on all levels, private enterprises, or individuals in the DHS mission areas of Prevention, Response, and Recovery. The Private Sector Office has four major missions: * Engage individual businesses, trade associations and other non-governmental organizations to foster dialogue with the Department. * Advise the Secretary on prospective policies and regulations and...

Words: 1203 - Pages: 5

Premium Essay

Apple Inc 2008

...URE , SAFE T Y, AN D E N VIRON ME N T PROGRAM Cybersecurity Economic Issues Corporate Approaches and Challenges to Decisionmaking RAND RESEARCH AREAS THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE C ybersecurity economics is an emerging field. There is a significant need for better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. In two articles, RAND senior scientist Shari Lawrence Pfleeger and her colleagues addressed these key cybersecurity concerns and identified how different types of companies or organizations perceive the importance of cybersecurity and make cybersecurity investment decisions. Abstract The emerging field of cybersecurity economics could benefit from better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity investment decisions. In particular, it suggests...

Words: 2167 - Pages: 9

Free Essay

Internet Governance

...| January 30 2014 | Critically analyse the main global governance issues relating to the internet and discuss how well these issues are being addresses at a global level. Word count: 1,986 | Global Governance | The internet has massively changed the business world. The internet has given companies the opportunity to increase their output and improve their competitiveness. The internet has allowed a company to work outside its base. E.g. a company’s headquarters is based in the UK, but they have a call centre in India where wages are a lot lower. According to (Society 2013) the internet works and runs the way it does, not because of government instructions or the intergovernmental agreement, but because internet governance is comprehensive, transparent and collective. The internet allows innovation, exchange of information between counties and flow of ideas. Furthermore it encourages economic growth, in return contributing to social and economic development. The term ‘Internet governance’ is used in more context that one. It applies to activities such as; coordination of technical standards, development, operation of critical infrastructure legislation and regulation. The internet is not restricted to government activities. There are different types of stakeholders and each of them has a different role in defining and carrying out Internet governance. There is not one specific person, company, organisation or government that runs the internet. It is made...

Words: 2112 - Pages: 9

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Premium Essay

Emerging Cybersecurity Strategies

...Abstract: Advanced cyberattacks on the public and private sectors at the local, national, and international level have prompted an increase in funding and support for the study of emerging cybersecurity technologies. The considerations for this paper are to discuss the emerging technologies and strategies that can be integrated across the public and private sector to improve cybersecurity on a local, national, and international level. New technologies need to dynamically assess networks real-time such as with the use of Remote Agents and Real-time forensic analysis. These technologies also need to make the attack space less predictable and constantly evolving such as through the use of moving target defense. Emerging Cybersecurity Technologies The E-government Act of 2000 was signed by President Bush to move toward a more 24-7 government. The dream was to eliminate the need to have to stand in line at the DMV for half a day just to pay annual vehicle registration fees (Barker, 2011). Security was certainly a concern, but it was not at the forefront of the move as government agencies would go through massive changes in equipment, manning, and practices in order to move information and programs online. Now, over a decade later we still see moves and changes taking place, such as the department of Veterans Affairs recently moving all of their applications, forms and records online. The expensive cost of getting the government caught up was expected with such an overhaul...

Words: 2624 - Pages: 11

Premium Essay

Federal Government

...electronic systems, information systems and space systems solutions. We will provide a brief overview of the current state of the defense contracting sector and the cyber security threats and policies that govern it. We will also examine the classes of data that the defense contractor must protect and the potential cyber defense technologies that could be implemented in a prioritized strategy to secure that information. This briefing will also provide the priorities for legal and policy compliance amongst Defense contractors. Because Hytema is a Defense contractor the organization must work closely with the Federal Government causing them to adopt many of their policies and regulations. The most strategic and informative policy is the Federal Information Security Management Act (FISMA). All departments and agencies are required to coordinate and cooperate with the Department of Homeland Security as it carries out its cybersecurity responsibility actives as noted in the Office of Management Budget (OMB) (Dhs.gov, 2015) 2. Social Importance 2.1 Effects on society of the sector Defense contractors contribute to a very large part of what is deemed as societal importance in today’s society, however they are often overshadowed. Defense contractors that work for the Department of Defense within the cyber technology sector take up almost eighty percent of the DoD staff (Defense.gov, 2015). The Department of Defense states that its main objective is not tanks, planes or...

Words: 1094 - Pages: 5

Premium Essay

Cybersecurity Standards: a Case Study on Malaysian Banking Sector

...Cybersecurity Standards: A Case Study on Malaysian Banking Sector Anwer Yusoff Head, Industry & Business Department CyberSecurity Malaysia Sept 18th 2013 Copyright © 2013 CyberSecurity Malaysia Internet use in Malaysia 17 ,723,000 internet users Sources: Internet World Stats (30 June 2012) Copyright © 2013 CyberSecurity Malaysia 2 Internet use in Malaysia The highest usage was recorded among people aged 20-24. almost 6 in 10 (57%) regularly use the internet. Malaysian internet users (aged 20-24) spend an average of 22.3 hours online per week 87.9% of Malaysians on the internet access Facebook Once online, Malaysian’s Top 3 activities 1. social networking sites 2. instant messaging 3. reading local news Source: The Nielsen Company (April 2011) Copyright © 2013 CyberSecurity Malaysia 3 HIGH LEVEL USAGE = HIGH RISK Copyright © 2013 CyberSecurity Malaysia 4 HIGH LEVEL USAGE = HIGH RISK Cyber Security Incidents (1997-2013) Reported to Cyber999 Help Centre 16,000 15,218 Type of incidents: 14,000 • • • • • • • • 12,000 10,000 8,000 As at 31st August 2013 Fraud and scams Intrusion and web defacement Destruction Denial-of-Service Virus / Malware Harassment Content-related Intrusion attempts 9,986 7753 8,090 6,000 3,566 4,000 2,123 2,000 81 196 1997 1998 527 347 1999 2000 860 625 2001 2002 ...

Words: 1957 - Pages: 8

Free Essay

Trends of Cybercrimes

...The Future of Cybersecurity LaToya Crook BCC/403 October 26, 2015 Professor David Pettinari The Future of Cybersecurity The world in which we live is becoming more socially connected than ever before. It seems that technological advances have met, if not exceeded, anyone's expectations as new ways to communicate continue to develop. Due to the innovations of mobile connections, global technologies, and the ominous cloud, information can be shared and accessed at the touch of a screen or the sound of one's voice. Digital equipment that were unheard of just five years ago now inundates both professional and personal arenas. As a result, organizations, as well as their employees, have begun to feel the pressure placed on them to address current and potential threats to the security of their systems and clients (CloudTweaks, 2013). Cybercriminals can retrieve and analyze information gained through technological access from a single business or entity and use such confidential data to give competitive advantages to other organizations, to satisfy the requests of influential individuals, or to benefit national security. The World Wide Web permits immediate and boundless communication and the ability to interface on a global level, which can have its downfalls just as much as its benefits. Unapproved access to, and abuse of, information, technology and fundamental systems can irreparably damage a person or organization’s character, financial status, sense of stability and...

Words: 1962 - Pages: 8