Cyber Security Case Study

Read Complete Research Material



Cyber Security Case Study



Cyber Security Case Study

Introduction

With the arrival of the Internet and its wide use in the last decade in the region, new threats and ways of committing crimes have been initiated. In order to support Member States in their fight against cyber crime, the Organization, through the Inter-American Committee against Terrorism (CICTE) and the Cyber ??Security Program, is committed to establishing and strengthening cyber security agenda in the Americas. With the cooperation of a wide range of national and regional institutions of the public and private sectors, in both political and technical issues, the OAS promotes and strengthens cyber security capacities of the member states through technical assistance and training, roundtables political, financial crisis management and exchange of best practices for the use of information technology and communication (PITAC, 2005).

Discussion

Every day, millions of people access the internet, exchanging information and use services such as banking, commerce, federal public service, state and local education and research networks social, among others, forming an extensive network of digital activities. The Cyber security challenge of the 21st century, has been highlighting how strategic role of State are essential to maintain critical infrastructure of a country, such as Energy, Defense, Transportation, Telecommunications, Finance, own information, among others (Lewis, 2006). Given these challenges, the United Nations have been preparing, urgently, to prevent or minimize the cyber attacks networks and information systems of government, as well as all other segments of society. Thus, the understanding of the importance of Cyber security is characterized increasingly as sine qua non of development, requiring only therefore, among other actions, the promotion of dialogue and exchanges of ideas, initiatives, data and information, best practices for cooperation on the issue in the country and between countries. Understanding therefore these movements and their opportunities and challenges are strategic issues that US Homeland Security has been improving and organizing to improve its position both at the national and, consequently, as regards their insertion internationally on the subject. Draws attention to the so-called cyberspace, has not yet clearly defined its borders, impacts the day to day of all government leaders, the private enterprises and citizens themselves.

In the new conformation of the Information Society, it highlights the following phenomena:

a) High technological convergence;

b) Significant increase of systems and networks information as well as interconnection and interdependence of the same;

c) Increasing growing and quite substantive Internet and social networks;

d) Advances in information technology and communication technologies (ICTs);

e) Increase of threats and vulnerabilities cyber security, and;

f) Complex environments with multiple actors, diversity of interests, and constant and rapid changes. In this context, international strategies in the topic point to the establishment of partnerships and actions effective collaborative between countries, that provides analysis, coordination, and integration of knowledge, allowing beyond the correlation between such knowledge, understanding the impact that the convergence and interdependence existing and yet to come, and will have in the future. (Verton & Brownlow, 2003) There is a tendency that these efforts should be supported by macro-coordination and governance ...