Week 8

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

322

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

1

Uploaded by marcuslavalais

Report
Week 8 Cyber seems, to many, to be the greatest future threat the US faces. Why is this the case? Discuss how our civil liberties are under attack via cyber and what needs to be done by the nation to protect them. If you believe that nothing can be done, then explain why you feel this way. Hello Class, Cybercrime is a growing crime that took place well before the internet was established. Criminals are now using advanced technology to hack into civilians’ bank accounts, gain personal information, and even attempt to gain access to secret/classified military documents. The innovative ways these criminals gain access to this information is unique and sometimes even hard to detect. It is the greatest future threat that the U.S. faces due to the yearly technological advances aiding in the ability to conduct cyberattacks from anywhere around the world. This can make it difficult to detect and counter. It is noted that attacks through cyber are hard to define and since attacks are conducted via the internet, these attacks have no boundaries (Zaffar, 2019). There are three forms of attacks on cyber that is define by policymakers, law enforcement, and other agencies: Cybercrimes, Cyberwarfare, and Cyberterrorism. Cybercrime focuses on attacks on an individual’s civil liberties. These attacks come in different forms that include financial gain by conducting identity theft, online fraud, cyberbullying, and more. Email spam and phishing is when the individuals receive emails of free offers, promises of financial gain, falsifying legitimate businesses, and more. Email spam is not illegal if it does not contain certain criteria, which puts personnel at risk of clicking on this material and jeopardizing identity theft. The FBI, DHS, and the Department of Justice are the agencies in charge of combating cybercrimes. Violations of these crimes need to be treated with harsher punishments. With that being said, I do not think there is anything that can be done to protect against an attack via cyber. Technology is advancing rather fast and a simple click on a link, the convincing person on the phone, and even public Wi-Fi network connections, are something hard to decline. Apple, mainly iPhones, collect data daily utilizing facial recognition and an advanced algorithm. The fact that 22% of cell phone users have an iphone, makes it almost impossible to combat an attack on civil liberties (Newkirk, 2016). Thank you for viewing. -Marcus References Newkirk, D. (October 12, 2016). Apple: Good Business, Poor Citizen”: A Practitioner’s Response. https://www.proquest.com/docview/2073960421? accountid=8289&parentSessionId= %2FcN5m4L5I0V1Mt71eBcZ9vOhWKxSCS4WpVsORTVpju4%3D Zaffar, E. (November 22, 2019). Understanding Homeland Security: Foundations of Security Policy. https://ebookcentral.proquest.com/lib/apus/reader.action?docID=5975377&ppg=424
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: The heights of German men are normally distributed with a mean of 65.9 inches and a standard…
Q: A wooden artifact has a ""C activity, of 24.9 counto per minute, as compared with activity of 32.5…
Q: A waiter believes the distribution of his tips has a model that is slightly skewed to the left, with…
Q: Zenon, Incorporated has the following taxable income: U.S. source income. Foreign source income…
Q: 4. Is it possible to precipitate 99.0% of 0.010 M Ce³+ by adding oxalate (C₂O2) without…
Q: Which molecules are polar?  SiF4 SF4 XeF4 CF4
Q: magine there is a consumption smoother (also known as a PIH consumer) who expects to live for…
Q: Analyze each description of an event to determine what type of power it illustrates below. Choose…
Q: Draw the starting structure that would lead to these major products. ... Drawing 1. mCPBA 2. H₂O* OH
Q: 1. Visualization (a) The middle graph below shows the velocity of a mouse (running back and forth…
Q: The 20th percentile is how many inches?
Q: For circuit series and parallel, the supply voltage of, Vsupply=240 Volts, R1= 202, R2=302, R3=82,…
Q: those two points. Is this demand elastic or inelastic?   Barron used to make $2,500 a month and eat…
Q: Compare Buddhist and Confucian philosophies. How did each respond to the political and social…
Q: Exercise 5.9.9 Write the solution set of the following system as a linear combination of vectors 0 0…
Q: Analyzing the spectrum of a distant galaxy, you discover evidence that a type la supernova is…
Q: The gamma function, which plays an important role in advanced applications, is defined for n 21 by…
Q: Is there an association between the use of computerized system and hospital mortality? In a large-…
Q: Exercise 7.2.7 Suppose A is an nxn matrix and let V be an eigenvector such that AV = V. Also suppose…
Q: Determine the principal planes and the principal stresses for the state of plane stress resulting…
Q: a) You want to determine the proportion of the croaker fish population that is longer than 14…
Q: meters (m) kilometers (km) Earth radii (R₂) light-years (ly) parsecs (pc)