In May 2010, Chinese hackers broke into US databases to steal records from over 20 million federal workers. In 2011, Iran created a worm called “Shamoon,” which quickly spread around the Middle East and destroyed 32,000 computers in Saudi Arabia by wiping data off computer hard drives at a major oil company. In 2007 hackers stole 22.1 million credit card numbers from Heartland Payment Systems by hacking through a single entry point in SQL injection vulnerability. Hackers have been stealing classified information for years just because they can – or because it gives them some thrill to get past every obstacle that’s put before them.
As new technology is being developed and implemented more quickly than ever, the internet is becoming increasingly more open and interconnected. And that spells trouble for everyone using it: Criminals who profit from hacked databases and stolen credit cards; terrorists who use social media to spread their message and recruit new members; political groups looking to overthrow governments or start wars–anyone with a strong enough motive or skill set.
The Internet has become so large, complex, and famous that cybersecurity is now essential for governing online transactions. The internet will be what we want it to be: either a secure global infrastructure that links people around the world in advanced technology while offering equal access to all users regardless of race, gender, or creed – OR – a sprawling mess of unmonitored chaos populated by criminals, terrorists, and hate groups while excluding those users mired in poverty and cut off from the rest of the world.
What we decide to make the internet will be decided by all of us – individuals, governments, military organizations, non-profits, and businesses alike. We can build a better Internet that is fair for everyone or benefits just a few individuals with enough money to pay for it. This is an important decision that should not be taken lightly because once we start down this path, there is no going back and no do-overs.
The Future of the Internet
The future of the Internet hinges on cyber security: How do we protect data? Who gets access to what types of information? What rules control who has access to what kind of data and how much of it? We need to establish a common understanding of cyber security and how it benefits us all before we start down this road.
The widespread use of computer technology has spawned a new field called “cyber security,” which deals with computers, electronic data, and the internet. Cyber security deals with any threat to the confidentiality, integrity, or availability of computer information. This includes naturally occurring events such as accidental loss of data through equipment malfunction or human error, malicious destruction in the form of viruses and other malware, and deliberate misuse in system penetration (hacking) by unauthorized parties (Blackburn).
The Internet is plagued with hackers who steal sensitive information for their gain – financially or politically motivated -and the only way to prevent it is through cyber security professionals according to RemoteDBA.com.
Why do we need cybersecurity
Computer technology, electronic data, and the Internet are all integral components of our modern society that have become indispensable to daily life and irreplaceable. Because of this, it is becoming increasingly important for governments, businesses, and individuals alike to create a system that protects against hackers who seek to obtain sensitive information through illegal means – financial or political – while simultaneously protecting the authentic right to privacy that every citizen has under any government’s constitution (even if the citizens don’t know about their rights yet).
We must remember when we discuss these issues in terms of “us” vs. “them,” especially regarding terrorism; at the end of the day, there isn’t a person in the world who isn’t looking out for their own best interest. With this in mind, we must create an Internet that benefits everyone equally without compromising anyone’s civil liberties – one of the fundamental principles of the American government.
This means that any system created to protect cyber security must consist of many different components which are constantly being evaluated and improved upon by both professionals and civilians alike. When discussing these issues online or otherwise, especially regarding terrorism, it is essential to remember that there isn’t a person in the world who isn’t looking out for their own best interest at the end of the day. When thinking about “us” vs. “them,” it is imperative that we create an internet that benefits everyone equally without compromising anyone’s civil liberties – one of the fundamental principles of the American government.
When we talk about cyber security, it is essential to remember that anything can be hacked into. You should always assume that any piece of information (data) on a computer or online is hackable and accessible by everyone. If we’re going to create a system for Internet data protection, we must first agree on some basic facts:
– Any Internet user has the right under the US Constitution to privacy from unauthorized access to their information without due process of law. This means not telling users if their personal information was breached.
– To protect against adversaries who seek to obtain sensitive information through illegal means such as terrorism, governments have an obligation under international human rights law to create a system that respects everyone’s rights equally.
– Only through funding and support from the American government can cyber security professionals – both civilian and military employees – be adequately protected against these adversaries so they may protect the people of America, promote America’s core values of freedom, equality, justice for all, and develop a more secure online environment for everyone.
In February of 2013, President Obama signed an executive order entitled Improving Critical Infrastructure Cybersecurity, which protected cyber security, companies from liability as long as they were acting within the scope of a government authority. This means that if a company hired a cyber security professional to monitor their Internet data for any signs of suspicious activity, they could not be held liable if its private information was breached.