Future of Technology
Autor: ulises11b • March 25, 2017 • Research Paper • 1,746 Words (7 Pages) • 874 Views
Introduction
In today’s society, it is clear that Technology and its connectivity has to change our lives and that of everyone using technology to browse, blog, read emails, buy things online. Companies and governments Store and gather information utilizing computers and other devices so. In a way, all of these changes and advances that connectivity brought us real meaningful and more security. Yet, for many people and companies, this is far from true, in fact for some people this world is less secure than ever being because their secrets and their information it's open to attacks by hackers and even some hostel States. Many people have used many of the tools that conductivity brought us; in many ways, good and bad. Cyberspace has been what organizations and even some countries with malicious purposes utilize to advance their agendas. Global connectivity, vulnerable connectivity or technology, and the anonymity make illegal activities easy to perform while on the cyberspace. This action may cause significant collateral damage, for example, if a computer it is infected with malware, and this computer connects to a network; others equipment and systems may be affected or neutralize evening please were not the original target of the primary attack. This is why many experts Believe that the future of technology Will dictate the future of cyber security. The more technology we use and rely upon, the more dangerous and vulnerabilities we will have.
Analyze the future of cyber security, including any opportunities for cooperation between the government and the private sector in creating or building a national cyber security infrastructure. Explain your thoughts.
While looking into the future, it is evident here we see a growing threat to our cyber security. Often we find more and more people are venturing into the cyberspace for their gain. This type of people has become more professional, more efficient, more organize. They have created networks where they can easily share information, buy data, and train themselves in the vulnerabilities of the ordinary networks used by ordinary people. These people have been able to find new ways to attack or networks and still data. But using hacking tools and other unpleasant surprises. So, the future of technology and the future of cyber security it's a complicated mixed up elements because people it's one of the primary four main elements of this complexity, we Society along with the law-enforcement agencies must focus on the people behind the machine. We can potentially achieve this by also implemented the same approach that these people use. We must build networks; we must become a professional; in other words, educated ourselves, become more alert, overall we must work together to prevent and manage our cyber security.
In the future, the only effective way to successfully manage to improve or cyber security is by Cooperation among the private sector in the several branches of government dealing with cyber security. The primary target of cybercrime is the private sector; they are the primary victims of cyber intrusions is also the private sector. The private sector is an excellent source technology and the ones the build the Components cyber security. In other words the future it's driven by the private sector, their role of victims and innovators of technology and infrastructure. For example, the FBI works together with the private sector to share information and better protect critical infrastructure. "the Domestic Security Alliance Council, with chief security officers from approximately 250 companies, represents every critical infrastructure and business sector. Another partnership is InfraGard, which promotes the sharing of information about threats to critical infrastructure. Today InfraGard has 58,000 members nationwide from the government, the private sector, academia, and law enforcement." (FBI, 2013). Along with this practices, we as a nation must also develop partnerships that allow us to share information among the different agencies and the different companies. One side of the partnership must include the government and on the other hand private sector, so that we can effectively coordinate investigative efforts, what the whole purpose of sharing information off cyber threats, investigations, and intelligence.
...