Wednesday, May 15, 2019
Cyber security Coursework Example | Topics and Well Written Essays - 500 words
Cyber protective cover - Coursework ExampleMore than one person should have passwords that permit accessibility of files. This can save meter wastage when one person who has the password is sick, on vacation or is dead. Individuals with the passwords should be known so that all breach or leakage should be traced to the one responsible.In as much as some(prenominal) governments are trying to come up with e-government systems that have user friendly and basic graphical interface, they should identify up measures that ensure that information security is maintained. They should not only focus on minimizing the costs of selective information storage. They should lay emphasis on data privacy and confidentiality.2. Cyber-crime is a transnational issue that makes extradition exceedingly difficult. use the Wikileaks case, discuss whether or not the breach of the U.S. classified network warrants the extradition and trial of Wikileaks founder Julian Assange in the United States.Data secur ity is an substantive issue when it comes to security information of any nation. morose international laws against data leakage are inevitable for the benefit of every ground. Trials of individuals who breach another countrys security network should be left for the aggrieved country. Data breach and leakage should be considered a crime, whether it is done from an office or at home.The United States government is unable to try Mr. Assange, a Swedish and founder of Wikileaks, for breaching the confidentiality of the United States security and official data. The United States cannot try him since there is no international overtop that considers his actions a crime. Additionally, national rules and laws of a single state cannot be applied to citizens of other countries.It is extremely essential that cyber security be considered a vital issue in a meeting of the United Nations. In the meeting, it is anticipated that the organization should declare cyber breaching and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment