The Computer World between Continued Development And The Security Systems And Protection Laws
ACKNOWLEDGEMENTS
I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.
DECLARATION
I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.
Signed __________________ Date _________________
ABSTRACT
This study investigates the topic of computer world between continued development and the security systems and protection laws. The study explores the facts that there is a constant change in the information technology world and along with that the rise of protection issues in the security systems also increasing. The study thus continues to find the conclusion how the protection laws are effective in eliminating the threats of security systems.
TABLE OF CONTENTS
ACKNOWLEDGEMENTSii
DECLARATIONiii
ABSTRACTiv
CHAPTER 1: INTRODUCTION7
Research Problem7
Research Hypothesis7
Limitations of the Study8
Significance of the Study9
Summary13
CHAPTER 2: LITERATURE REVIEW16
Background16
Summary of Data Protection in THE UK16
Technology Trends19
Current Scenario20
Strategic Approach22
Security Protection law, Compliance and Assurance23
(a) Critical Information Infrastructure Protection23
(b) Security Systems Assurance Framework24
Trusted Company Certification25
Security Incident - Early Warning & Response26
(b) The essential actions under National Cyber Alert System include:26
(c) Creation and Augmentation of Response Capabilities27
(d) International cooperation and information sharing27
Security Training - Security, Digital Evidence & Forensics28
Security R&D29
Role of Government30
Summary32
CHAPTER 3: METHODOLOGY35
Qualitative Research35
Research Method35
Literature Selection Criteria36
Search Technique36
Difference37
Theoretical Framework38
CHAPTER 4: RESULTS AND DISCUSSION39
CHAPTER 5: CONCLUSION48
The Future53
REFERENCES55
CHAPTER 1: INTRODUCTION
Research Problem
When computer-based systems or the means by which these systems' electronic data are transmitted (i.e. critical information and communication technology, information technology etc.) is disrupted, the resulting problems are serious. Losing access to vital records and legal documents; losing productivity and accountability; and losing revenue are just a few of the tangible results of such a failure. One only needs to turn on the evening news or read a newspaper to know the effect a major security systems disruption has - the impact on ordinary life is far-reaching. The consequences of a systems failure are much more than an inconvenience; these events lead to public distrust, fear and confusion.
Research Hypothesis
In less than two decades, advances in information and communications technologies have revolutionized government, scientific, educational, and commercial infrastructures. Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone systems and predominantly closed networks into a virtually seamless fabric of interconnectivity. The types of devices that can connect to this vast information technology (IT) infrastructure have multiplied to include not only fixed wired devices but mobile wireless ones. (Fafinski, 2007) A growing percentage of access is through always-on connections, and users and organizations are increasingly interconnected across physical and logical networks, organizational boundaries, and national borders. As the fabric of connectivity has broadened, the volume of electronic information exchanged through what is popularly known as security systems has grown dramatically and expanded beyond traditional traffic to include multimedia data, ...