blog




  • Essay / Cybersecurity Essay - 2189

    Cyberbullying and Cybersecurity Risks in 2014Home Needless to say, advanced technologies have become integrated into more and more aspects of our lives over time. These days, there are few services (including many fundamental services) that do not depend on the Internet. Whether it is for email, entertainment, education, or banking purposes, among many other services available, we depend on the Internet on a daily basis. With the rapidly evolving phenomenon of social media, people are online more often than ever; some might even call it addiction. Coupled with the rapid evolution of technological convergence, such as that seen today in smartphones and even flat screen televisions, we have access to a wide range of Internet services everywhere we go. It is clear that as more and more of our physical activities are replaced by online activities, the fine line between real life and online life will soon be non-existent. Not to mention, the availability and accessibility of these technologies have also expanded significantly in recent times, with a wide variety of demographics entering and remaining in “cyberspace.” This movement into cyberspace has given rise to many equivalent cybersecurity terms, such as cyberbullying and cybersecurity, all falling under the domain of cyberethics. This website will discuss the many implications of living in cyberspace. Additionally, after a brief introduction to the topic of cyberbullying and cybersecurity risks, a more in-depth analysis will be conducted through the following lenses: (1) history, (2) architecture and geography, (3) governance and placement of barriers , (4) freedom. speech, (5) intellectual property and (6) privacy. Finally, the website will have a conclusion and ending...... middle of paper ......ng company branding, individuals are required to provide sensitive information such as passwords, financial information, etc. This is a clear use of intellectual property in theft schemes for financial gain. Hacking is another common cybersecurity threat in which unauthorized access is gained to an individual or company's computer system. When hackers break into a company's databases, they can obtain a lot of information about the company, its trade secrets, its customers, and more. Although many people can be affected by a breach, cutthroat competition (and therefore hacking) usually starts at the enterprise level. . Companies can be ruthless, using more common techniques such as espionage to gain the upper hand. Recently, the United States had a major problem with Chinese hackers stealing much of American intellectual property.