Reychele’s Blog
Just another WordPress.com weblog

Chapter Title: Security in Cyber Space

Chapter Title: Security in Cyber Space

Name of the Book: Cyber Ethics

Library Reference: N/A

Amazon Link:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

Quote:

“It is important to note that in information and communication technology context, the term security is often used in ambiguously and sometime equivocally.”

Learning Expectations:

1. To know what is Security in Cyber Space.
2. To know the Two Sense of Security.
3. To know different Crimes, Abuse and Terrorism in Cyberspace.
4. To know Anonymity.
5. To know Encryption.

Review:

Many representatives from groups in both the public and private sectors have argued for the need to increase security on the internet, claiming that the current security mechanisms are either outdated or inadequate. According to this book before identifying and discussing security issues on the Internet, it is useful to note that the concepts of security and privacy are closely related and that certain issues associated with two notions frequently overlap.

Internet related privacy concerns often arise because online users are concerned about loosing control over their personal information to organizations who claim to have some legitimate need for and right to that information in order to make important decisions. Internet related security concerns, on the other hand, sometimes arise because of fear that personal or proprietary information might be accessed and manipulated by individuals who have no legitimate need for or right to such information. Security concerns also arise because of the fear that confidential messages communicated over the internet might be intercepted by computer hackers or that computer systems themselves might be attacked by computer viruses.

It is important to note that in information and communication technology context, the term security is often used ambiguously and sometimes equivocally. There is also another sense of security that refers not much to the vulnerability of a computer system software and hardware resources.

In this chapter, issues evolving both sense of security and considered. Whereas security issues related to attacks on a computer system’s resource and on that systems residents data are considered in the chapters.
Learning’s/Insights:

• The cryptographic technique described thus far is referred to as private key encryption or weak encryption where both parties use the same encryption algorithm and the same private key.
• Public key or strong encryption is of particular interest to governmental agencies responsible for protecting national security and military intelligence, preventing terrorism, and enforcing law.
• It is important to note that in information and communication technology context, the term security is often used ambiguously and sometimes equivocally.
• Internet related privacy concerns often arise because online users are concerned about loosing control over their personal information to organizations who claim to have some legitimate need for and right to that information in order to make important decisions
Integrative Questions:

1. What is Security in Cyberspace is all about?
2. What are the Two Senses of Security?
3. What are the Crime, Abuse, and Tourism in Cyberspace?
4. What is Anonymity?
5. What is Encryption?

No Responses to “Chapter Title: Security in Cyber Space”

Leave a comment