Internet Hacking and Cybersecurity Conundrum Analysis Essay

Exclusively available on IvyPanda Available only on IvyPanda

Background

Globally, the Internet is one of the fast-growing technology platforms marked with continuous and rapid innovations. The information and communication technology (ICT) infrastructure has significantly contributed to digitalization. The rising demand for the Internet and connectivity has inspired computer technology integration into devices that previously functioned without it, such as automobiles or apartments. Even though new technologies have focused on addressing consumer needs, challenges have been encountered, including cyberattacks (Alashi & Badi, 2020). Many people have gained access to computer systems, the Internet, and related products and services, leading to the emergence of cyber-related threats. In such regards, identity theft and capturing sensitive data via the Internet and fraudulent activities have increased. However, the use of the Internet stretches beyond information infrastructure to other network-based services. The ICT applications are perceived as structures for development because they allow for efficient service delivery. With the right approach, setting, and implementation, ICT can enhance quality and productivity in public and private domains in the United States.

We will write a custom essay on your topic a custom Essay on Internet Hacking and Cybersecurity Conundrum Analysis
808 writers online

Discussion

ICT has been integrated into daily life activities that have enabled the development of the information society. Through the information society, various opportunities are available for Internet users. For instance, increased open institutions and democracy are enhanced due to unrestricted access to information (Smith, 2017). The growth of the information age has demonstrated a vulnerability in some ICT applications, promoting computer-related crimes. Damages resulting from cybercrime are enormous: malicious software could be accrued $17 billion in the past decade. Recently, revenues from cybercrimes were over $100 billion, which surpassed the illegal drug trade (Atli, 2017). Such considerations indicate the potential threat posed by cyber-attacks in the future. About 60% of businesspersons in the United States are convinced that cybercrimes are costlier than physical crimes. Some malicious software like Stuxnet identified in 2010 was a threat to critical infrastructure (Alashi & Badi, 2020). Stuxnet had over 4000 functions targeting software of computer systems used in controlling sensitive information. Therefore, there is a need to enhance cybersecurity measures to combat cybercrimes and protect ICT infrastructures.

The UN General Assembly highlighted cybercrime as a significant challenge while addressing resolutions on cybersecurity. Cybersecurity improvements are vital to the continuous developments in information technology (IT), national security, and the economy (Smith, 2017). In such regard, the Internet and its user’s safety are core to establishing new services and government policies. However, preventing cybercrime is vital to national security and safeguarding the critical information infrastructure. Adopting a legislative framework against the use of ICT for fraudulent activities undermines the integrity of critical infrastructures (Jang-Jaccard & Nepal, 2014). Nationally, coordination among the government agencies, private firms, and the public is required to prevent, prepare, and respond to cyberattacks. The relevant partners should also cooperate and coordinate on a global scale to mitigate cyber threats (The Heritage Foundation, 2019). For such reasons, formulating and implementing cybersecurity measures necessitate a comprehensive approach. For instance, educating Internet users or developing technical protection systems minimizes the risk of cybercrime.

A coherent global strategy is required for addressing the problems posed by cybercrimes since the legal, institutional, and technical challenges are far-reaching. For instance, the World Summit for the Information Society (WSIS) supported the concept of international cooperation after appreciating the significant risks posed by inadequate cybersecurity and the intensification of cybercrimes. Provisions in the WSIS have established a plan for multi-stakeholder implementation to boost confidence and security in the ICT services and products’ consumption. Such an objective was supported by the Global Security Agenda (GCA) to increase cybersecurity issues (Jang-Jaccard & Nepal, 2014). For example, legal measures should be implemented to report the legislative challenges of crimes over the ICT networks. The law enforcement of the United States should also participate in investigating and prosecuting cybercrimes.

The GCA’s technical and procedural measures emphasize the procedures used in promoting security and risk management in cyberspace. GCA’s organizational structures pursue to prevent, detect, counteract, and manage cyberattacks. Moreover, capacity building has been aimed at increasing awareness, transferring skills, and boosting cybersecurity nationwide. Finally, GCA’s international cooperation indicated the need for a universal approach to addressing cyber threats (Jang-Jaccard & Nepal, 2014). Therefore, adequate legislation can be developed within the GCA approach to enhance cybersecurity.

Conclusion

Overall, the development of the Internet primarily focused on the free flow of information and openness of society instead of security. Such consideration explains the increasing challenge of realizing cybersecurity amid the proliferation of cybercrimes. The information society has been characterized by an unprecedented level of information exchange via the Internet, leading to significant gains in individual liberty, prosperity, and empowerment. Protecting Internet users from malicious activities within cyberspace with no compromise on its openness remains a challenge. Such a concern calls for international cooperation to address cybersecurity issues. A global perspective on cybersecurity is the only viable option since perpetrators and victims of cyberattacks can be anywhere. Through international frameworks, legal, organizational, technical, and capacity-building measures can be implemented to improve cybersecurity and combat cybercrimes.

References

Alashi, S. A., & H. Badi, D. (2020). The role of governance in achieving sustainable cybersecurity for business corporations. Journal of Information Security and Cybercrimes Research, 3(1), 97-112. Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Atli, D. (2017). Cybercrimes via virtual currencies in international business. Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 121-143. Web.

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 97-93. Web.

Smith, A. (2017). Americans and cybersecurity. Pew Research Center: Internet, Science & Tech. Web.

The Heritage Foundation. (2019). The growing threat of cyberattacks. The Heritage Foundation. Web.

Print
Need an custom research paper on Internet Hacking and Cybersecurity Conundrum Analysis written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, June 23). Internet Hacking and Cybersecurity Conundrum Analysis. https://ivypanda.com/essays/internet-hacking-and-cybersecurity-conundrum-analysis/

Work Cited

"Internet Hacking and Cybersecurity Conundrum Analysis." IvyPanda, 23 June 2022, ivypanda.com/essays/internet-hacking-and-cybersecurity-conundrum-analysis/.

References

IvyPanda. (2022) 'Internet Hacking and Cybersecurity Conundrum Analysis'. 23 June.

References

IvyPanda. 2022. "Internet Hacking and Cybersecurity Conundrum Analysis." June 23, 2022. https://ivypanda.com/essays/internet-hacking-and-cybersecurity-conundrum-analysis/.

1. IvyPanda. "Internet Hacking and Cybersecurity Conundrum Analysis." June 23, 2022. https://ivypanda.com/essays/internet-hacking-and-cybersecurity-conundrum-analysis/.


Bibliography


IvyPanda. "Internet Hacking and Cybersecurity Conundrum Analysis." June 23, 2022. https://ivypanda.com/essays/internet-hacking-and-cybersecurity-conundrum-analysis/.

Powered by CiteTotal, automatic reference maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1