The Computer World Between Continued Development And The Security Systems And Protection Laws

Read Complete Research Material



The Computer World between Continued Development And The Security Systems And Protection Laws



ACKNOWLEDGEMENTS

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

ABSTRACT

This study investigates the topic of computer world between continued development and the security systems and protection laws. The study explores the facts that there is a constant change in the information technology world and along with that the rise of protection issues in the security systems also increasing. The study thus continues to find the conclusion how the protection laws are effective in eliminating the threats of security systems.

TABLE OF CONTENTS

ACKNOWLEDGEMENTSii

DECLARATIONiii

ABSTRACTiv

CHAPTER 1: INTRODUCTION6

Research Problem6

Research Hypothesis6

Limitations of the Study7

Significance of the Study8

Summary12

CHAPTER 2: LITERATURE REVIEW15

Technology Trends15

Current Scenario16

Strategic Approach18

Security Protection law, Compliance and Assurance19

(a) Critical Information Infrastructure Protection19

(b) Security Systems Assurance Framework20

Trusted Company Certification21

Security Incident - Early Warning & Response21

(b) The essential actions under National Cyber Alert System include:22

(c) Creation and Augmentation of Response Capabilities22

(d) International cooperation and information sharing23

Security Training - Security, Digital Evidence & Forensics24

Security R&D25

Role of Government26

Summary27

REFERENCES31

CHAPTER 1: INTRODUCTION

Research Problem

When computer-based systems or the means by which these systems' electronic data are transmitted (i.e. critical information and communication technology, information technology etc.) is disrupted, the resulting problems are serious. Losing access to vital records and legal documents; losing productivity and accountability; and losing revenue are just a few of the tangible results of such a failure. One only needs to turn on the evening news or read a newspaper to know the effect a major security systems disruption has - the impact on ordinary life is far-reaching. The consequences of a systems failure are much more than an inconvenience; these events lead to public distrust, fear and confusion.

Research Hypothesis

In less than two decades, advances in information and communications technologies have revolutionized government, scientific, educational, and commercial infrastructures. Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone systems and predominantly closed networks into a virtually seamless fabric of interconnectivity. The types of devices that can connect to this vast information technology (IT) infrastructure have multiplied to include not only fixed wired devices but mobile wireless ones. (Fafinski, 2007) A growing percentage of access is through always-on connections, and users and organizations are increasingly interconnected across physical and logical networks, organizational boundaries, and national borders. As the fabric of connectivity has broadened, the volume of electronic information exchanged through what is popularly known as security systems has grown dramatically and expanded beyond traditional traffic to include multimedia data, process control signals, and other forms of data. New applications and services that use IT infrastructure capabilities are constantly ...
Related Ads