Thursday, July 25, 2019

Compare Chinese and American national cybersecurity policies (or more Term Paper

Compare Chinese and American national cybersecurity policies (or more countries)) - Term Paper Example The purpose of this study is to compare the effectiveness of the national cyber security policies that have been applied in China and America and to provide viable solutions to the weaknesses in these policies. By drawing from a wide range of theoretical and statistical resources, it will be possible to compare the performance of the cyber security policies in these countries. A critical analysis of the materials will provide an adequate ground to provide workable solutions to that will help the government to improve cyber security policies in their countries. Chinese versus American National Cyber Security Introduction Cyber security is a term that emerged immediately after the development of a data-centric world that is driven by the internet and online presence. As the global trends demand more engagement of the internet and all business operations become driven by this technology, the need for data security has risen due to the existence of hacking and identity theft as the man a t the middle gains access to sensitive information during its transmission. Even today, many organizations and citizens continue to be victims of victims of cybercrime sending an alarm to the government to implement online security to assure safety of sensitive business transactions. China and America are among the countries that have focused on the cyber security to guarantee safety of information in online business. The purpose of this paper is to make a comparison between the America cyber security policies with those that have been deployed in China. To draw this comparison, the policies applied in each country will be analyzed and their impact on data security will be evaluated. A secondary research will be conducted from a wide range of materials including government reports and validated research works to gather authentic information. The information so obtained will be related to the subject topic to form a basis of the conclusions. From the research, it will be possible to provide recommendations for alternative mechanisms that can be used to beef up cyber security and guarantee safety of information sent over the networks. This will provide a substantial platform for the improvement of data security policies not only in China and America, but also across other nations that have been hit with the blow of cybercrime in the business environment. Background of Cybercrime and Cyber-Security Cybercrime refers to the use of software, fish-mails or peculiar malware to obtain user information illegally during a data transmission process. With the current increase in online monetary transactions, the cyber criminals have vested more efforts to obtain information from citizens and business organization. For instance, when an online banker feeds their credentials into the online accounts, it is possible for hackers to obtain this information and use it to make illegal transactions. According to United States Department of Crime and Justice, (2013) about 5 millio n Americans are hacked every year and their identity information is used and at least $50 million dollars is lost to cyber-criminals. In China, Anderson reports that in China, over 700,000 web users fall victim of cybercrime every without their knowledge and over $874 million is lost to fraudsters. Despite the imperative efforts that have been engaged to tackle the problem, cybercrime continues to be a big problem in many countries. The 2013 cybercrime report presented by Sophos new

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.