Maurice Tutor

(5)

$15/per page/Negotiable

About Maurice Tutor

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Biology,Calculus,Chemistry,Economics,English,Essay writing,Geography,Geology,Health & Medical,Physics,Science Hide all
Teaching Since: May 2017
Last Sign in: 398 Weeks Ago, 3 Days Ago
Questions Answered: 66690
Tutorials Posted: 66688

Education

  • MCS,PHD
    Argosy University/ Phoniex University/
    Nov-2005 - Oct-2011

Experience

  • Professor
    Phoniex University
    Oct-2001 - Nov-2016

Category > Management Posted 14 Jun 2017 My Price 11.00

Escalating Security Threats

1. Escalating Security Threats

Economic and national security threats to the United States from cyberspace (the virtual place where online communications occur) grow annually. A mushrooming underground economy scams computer users to the tune of $100 billion a year. Recently, the NewYork Times concluded that thieves profit tremendously in cyber conflicts. Patrick Lincoln, director of the computer science laboratory at SRI International, is quoted as saying, "Right now, the bad guys are improving more quickly than the good guys." Several Business Week articles over the past year relate a rising number of security gaps amid sensitive computer networks. For example, in fiscal year 2008, the Department of Homeland Security (DHS) wrestled with nearly thirteen thousand cybersecurity incidents, a 150 percent increase from the prior year. In the summer of 2007, Newsweek reports that 1 ,500 Pentagon computers were hacked. The Department of Defense acknowledges that the military copes with over three million digital intrusions to official networks daily.

The CSIS report verifies that foreign opponents invade U.S. computer networks and capture valuable data regularly. Corporate losses measure in the billions. Such attacks threaten the economy as antagonistic interests gain access to corporate business plans, intellectual property, supply chain information, and customer communications. This erodes the dividends from innovation and unintentionally underwrites the research and development of international competitors. Failure to defend cyberspace adequately encourages more attacks. Moreover, the global strategic environment means cyberspace vulnerabilities offer high value targets to antagonistic interests.

 

 

2. Legal and Regulatory Initiatives

Legal and budgetary authorities pertaining to federal cybersecurity must be modernized. The Federal Information Security Management Act requires overhauling to shield government-connected systems from attacks and known vulnerabilities. The cornmission recommends that this include performance assessment. Further, the historic distinction between civilian and national security systems must be replaced with a riskbased orientation that demands privacy impact appraisals. As part of the legal review, the statutory framework for pursuing criminal investigations of Internet crime needs updating. The primary task here is to engage Congress in legislation designed to speed investigations while protecting the privacy of legitimate users.

Cyberspace demands regulation. On the basis of threat assessment levels, the United States must secure sustainability of critical services in cyberspace through defending critical cyber infrastructures and issuing standards. The commission identifies energy, finance, convergence of information technology and communications, and government services (including state and local governments) as essential cyber infrastructures. It suggests a new regulatory approach that avoids overreliance on market forces. Public-private partnerships should concentrate on infrastructures while coordinating protocols for protection and response. Performance security metrics and enforceable standards require development.

 

I need a 200 word summary on these two paragraphs

Answers

(5)
Status NEW Posted 14 Jun 2017 08:06 PM My Price 11.00

Hel-----------lo -----------Sir-----------/Ma-----------dam----------- Â-----------  -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)