Wednesday, May 1, 2019
Compare Chinese and American national cybersecurity policies (or more Term Paper
Compare Chinese and Ameri underside national cyber security system policies (or more countries)) - Term Paper ExampleThe purpose of this study is to compare the effectiveness of the national cyber security policies that fuck off been applied in China and America and to provide viable solutions to the weaknesses in these policies. By drawing from a wide range of theoretical and statistical resources, it will be contingent to compare the performance of the cyber security policies in these countries. A critical analysis of the materials will provide an passable ground to provide workable solutions to that will help the g overnment to improve cyber security policies in their countries. Chinese versus American National Cyber Security Introduction Cyber security is a term that emerged immediately after the reading of a data-centric world that is driven by the internet and online presence. As the global trends demand more passage of arms of the internet and all business operations bec ome driven by this technology, the need for data security has risen due to the existence of hacking and identity theft as the man at the middle gains get at to sensitive schooling during its transmission. Even today, many organizations and citizens continue to be victims of victims of cybercrime sending an alarm to the government to use online security to assure safety of sensitive business transactions. China and America are among the countries that have concentrate on the cyber security to guarantee safety of information in online business. The purpose of this paper is to make a comparison between the America cyber security policies with those that have been deployed in China. To draw this comparison, the policies applied in individually country will be analyzed and their impact on data security will be evaluated. A secondary research will be conducted from a wide range of materials including government reports and formalize research works to gather authentic information. Th e information so obtained will be related to the work topic to form a basis of the conclusions. From the research, it will be possible to provide recommendations for alternative mechanisms that can be used to beef up cyber security and guarantee safety of information sent over the networks. This will provide a substantial platform for the improvement of data security policies not moreover in China and America, but also across other nations that have been hit with the blow of cybercrime in the business environment. Background of Cybercrime and Cyber-Security Cybercrime refers to the use of software, fish-mails or peculiar malware to obtain user information illegally during a data transmission process. With the current increase in online monetary transactions, the cyber criminals have vested more efforts to obtain information from citizens and business organization. For instance, when an online banker feeds their credentials into the online accounts, it is possible for hackers to ob tain this information and use it to make illegal transactions. According to coupled States Department of Crime and Justice, (2013) about 5 million Americans are hacked every year and their identity information is used and at least $50 million dollars is lost to cyber-criminals. In China, Anderson reports that in China, over 700,000 mesh users fall victim of cybercrime every without their knowledge and over $874 million is lost to fraudsters. Despite the imperative efforts that have been engaged to tackle the problem, cybercrime continues to be a big problem in many countries. The 2013 cybercrime report presented by Sophos new
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment