Defining the Legal and Ethical Boundaries at the Cyber Frontier

Essay details

Please note! This essay has been submitted by a student.

Cybersecurity is not only the technical issue. Its more than that. It should be viewed through legal and ethical perspective. Michael Chertoff, in the video, is delivering knowledge on cybersecurity beyond the technological perspectives. He endorses that cybersecurity is more governmental issue than technological issue and it should be regulated creating legal and ethical boundaries. The privacy has been changed. Back in the days, when internet was not readily available to the evil hands, private information used to be inaccessible to any second person.

Essay due? We'll write it for you!

Any subject

Min. 3-hour delivery

Pay if satisfied

Get your price

The owner of the information had to share the information to make it public. But now, the scenario is diagonally opposite. As soon as the device is connected, if it is not protected well, information may get leaked. Privacy, confidentiality, and non-repudiation challenges are growing. Michael Chertoff also has discussed about the scenario shift in ‘public memory’ and how information technology is playing the role to contribute such a shift in public memory. Back in the days, events used to be stored only in human memory, and with time, it used to be forgotten. But now, any event is recorded and released through social media. It resides in machine memory and it can be used in any time when needed. This has created a challenge to the society that if not controlled, would produce detrimental effects. Another key note that the video delivers is about critical infrastructures, control system, and cyber security.

As we know, financial houses, electric grids, hospitals, government operations come under the critical infrastructures. Most of these systems are controlled and run through the internet. There is increased risk of security in those infrastructures. Crimes, intellectual property damage, harassment and similar issues can be resolved by general law enforcement. However, in this information era, the internet war in cyberspace has been expanded to its highest level. If espionage, or critical infrastructure related attacks occur through cyberspace, there is nothing to combat such events. To address those challenges, according to Michael Chertoff, we need to rethink on security architecture, securing the data in it, and controlling the permission of data access and use through creating national level policies. He also purposes that we need doctrine of cyberwar to combat those attack oriented to critical infrastructure.

Get quality help now

Professor Jared

Verified writer

Proficient in: Computer Science, Privacy & Security

4.9 (378 reviews)
“My paper was finished early, there were no issues with the requirements that were put in place. Overall great paper and will probably order another one.”

+75 relevant experts are online

More Essay Samples on Topic

banner clock
Clock is ticking and inspiration doesn't come?
We`ll do boring work for you. No plagiarism guarantee. Deadline from 3 hours.

We use cookies to offer you the best experience. By continuing, we’ll assume you agree with our Cookies policy.