Font Size: a A A

Theory vs. techology: The war on cyber crime

Posted on:2017-10-29Degree:M.SType:Thesis
University:Utica CollegeCandidate:Mabon, Justin CFull Text:PDF
GTID:2456390008452934Subject:Science Education
Abstract/Summary:
Numerous breaches have caused the United States government officials to spend a substantial amount of money on technology to protect against hacks and breaches in the U. S. The vulnerability of cyberspace has been of major concern and discussion. In fact, once new technology is created and then implemented to provide a safeguard for patrons, often times it seems to fail when faced with cyber attacks. Research states that cyberspace and its infrastructure are consistently under a wide range of attacks from both cyber hazards and cyber threats. Because of this, cyber perpetrators are constantly using sophisticated measures to exploit software vulnerabilities to steal companies' account information and individuals' personal information to disrupt and destroy. This act of crime threatens services that are essential for the prosperity of this country and future growth against other countries. Crimes such as financial and banking fraud, inappropriate production and distribution of individual's personal data, and other criminal acts have caused great harm and far-reaching consequences to many without warning. Researchers have highlighted the many difficulties to secure cyberspace due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks. As information technology becomes increasingly integrated with physical infrastructure operations, there is increased risk for wide scale or high-consequence events that could cause harm or disrupt services upon this economy and the daily lives of millions of Americans. Educating American citizens on the theories and practical applications of Cybersecurity could help better prepare the Cybersecurity community and the U.S against significant compromises. Keywords: breaches, hacking, Cybersecurity, terrorism.
Keywords/Search Tags:Cyber, Breaches
Related items