The Computer World between Continued Development And The Security Systems And Protection Laws
ACKNOWLEDGEMENTS
I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.
DECLARATION
I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.
Signed __________________ Date _________________
ABSTRACT
This study investigates the topic of computer world between continued development and the security systems and protection laws. The study explores the facts that there is a constant change in the information technology world and along with that the rise of protection issues in the security systems also increasing. The study thus continues to find the conclusion how the protection laws are effective in eliminating the threats of security systems.
TABLE OF CONTENTS
ACKNOWLEDGEMENTSii
DECLARATIONiii
ABSTRACTiv
CHAPTER 1: INTRODUCTION6
Research Problem6
Research Hypothesis6
Limitations of the Study7
Significance of the Study8
Summary12
CHAPTER 2: LITERATURE REVIEW15
Technology Trends15
Current Scenario16
Strategic Approach18
Security Protection law, Compliance and Assurance19
(a) Critical Information Infrastructure Protection19
(b) Security Systems Assurance Framework20
Trusted Company Certification21
Security Incident - Early Warning & Response21
(b) The essential actions under National Cyber Alert System include:22
(c) Creation and Augmentation of Response Capabilities22
(d) International cooperation and information sharing23
Security Training - Security, Digital Evidence & Forensics24
Security R&D25
Role of Government26
Summary27
REFERENCES31
CHAPTER 1: INTRODUCTION
Research Problem
When computer-based systems or the means by which these systems' electronic data are transmitted (i.e. critical information and communication technology, information technology etc.) is disrupted, the resulting problems are serious. Losing access to vital records and legal documents; losing productivity and accountability; and losing revenue are just a few of the tangible results of such a failure. One only needs to turn on the evening news or read a newspaper to know the effect a major security systems disruption has - the impact on ordinary life is far-reaching. The consequences of a systems failure are much more than an inconvenience; these events lead to public distrust, fear and confusion.
Research Hypothesis
In less than two decades, advances in information and communications technologies have revolutionized government, scientific, educational, and commercial infrastructures. Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone systems and predominantly closed networks into a virtually seamless fabric of interconnectivity. The types of devices that can connect to this vast information technology (IT) infrastructure have multiplied to include not only fixed wired devices but mobile wireless ones. (Fafinski, 2007) A growing percentage of access is through always-on connections, and users and organizations are increasingly interconnected across physical and logical networks, organizational boundaries, and national borders. As the fabric of connectivity has broadened, the volume of electronic information exchanged through what is popularly known as security systems has grown dramatically and expanded beyond traditional traffic to include multimedia data, process control signals, and other forms of data. New applications and services that use IT infrastructure capabilities are constantly ...