Sunday, February 16, 2020

You can choose any question but it should be about GLOBALIZATION AND Essay

You can choose any question but it should be about GLOBALIZATION AND TECHNOLOGY ,COMMUNICATION AND MEDIA - Essay Example owever, let it not be also taken for granted that globalization paved the way for the emergence of highly-defined technologies which, in the long run, catered for the sophistication of the structures and for the relatively higher degree of productivity with the functions in the different fortes of society. Hence, this account aims not only to identify the existing relationships among two variables—globalization and technology—alone but also to examine the effects of globalization and technology to more extensive areas, specifically media and communications. This idea, moreover, is conceived prior to the practically recognized fact that today’s century is the epoch which is highly driven by the struggle for the acquisition of information; and that the requisite for such acquisition is basically through getting hold of the communications and media systems around the globe. As one article had put it, globalization opened the gates for the development of â€Å"Information Highways,† which permitted the fast exchange of information and which provided passages for communication around the globe (Asilo, 2007). This account, moreover, includes the examination of the different relationships posited by the different variables concerned. Such relationship is identified so as to provide a link of interconnectivity between the variables concerned, which, as it would be presented in the proceeding discussions, would create a domino effect of impacts on each other. The topic to which this account is to begin with, moreover, is on the basic notions of globalization and technology, as its prime vehicle—as these two concepts tend to perform with one another side by side. There is a significant relationship that exists between technology and globalization—the former exhibits an important role in the development of the latter (Schaeffer, 2003). In fact, the process of globalization and the development of technology through times go hand in hand—globalization creates

Sunday, February 2, 2020

Social Engineering Attacks and Counterintelligence Essay

Social Engineering Attacks and Counterintelligence - Essay Example This essay looks at the concept from the security viewpoint. â€Å"Social Engineering is defined as the process of deceiving people into giving away access or confidential information† (Social Engineering Defined). Hackers, identity thieves, information brokers, disgruntled employees etc. are examples of social engineers. Dr. Max Kilger, co-author of the  Honeynet Project identifies the motivators for non-ethical computer activity which can also be applied to social engineering; these are money, entertainment, ego, cause, entrance into a social group and status within that social group (Typical Goals of a Social Engineer). Counter Intelligence To a layman, counterintelligence would mean the opposite of intelligence seen from the security angle. â€Å"Counterintelligence (CI) can be defined as information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities† (Office Of Counterintelligence, 2011). Implications to National Security New age threats of different kinds according to Car and Musladin (2013) pose a challenge to national security. These are explained below. A few such challenges like terrorism, organized crime, and activism with a negative face are considered here. Terrorism is one of the dreaded scourges that affect national security. As Car and Musladin explain, terrorists actively use the internet to network and carry out physical attacks on nations, who even own up to terror acts on the internet. Organized Crime cannot be far behind. The use of the internet ensures that people at the higher echelons of a terror network go unapprehended and remain free to plan further terror strikes. All sorts of fraud take place by cheating unsuspecting victims. The defrauding of banks and other financ ial institutions can lead to the destabilization of the economy. According to Car and Musladin, activism with a negative face also finds voice on the internet. This can shape and build public opinion. Unfortunately, it can provoke the masses as they can be manipulated by touching raw nerves. On the other end of the spectrum, the internet is also the stage of revolutions and protests. The Arab Spring is an instance of a revolution that took the help of digital media. When mainstream media is muffled or does not offer any succor, it is such media which become the voice of the public and leads to revolutions. Importance of Sound Information Workforce It is of utmost importance that a sound information workforce is maintained. The workforce should be aware of and alert about their work environment at all times. They should be sensitized to the value of the data being handled by them. Only an aware workforce can secure its data. Social engineering also poses a grave threat to security. T he key to preventing this would be a transparent communication system at all times. Impersonation and identity thefts can be reduced to a large extent with a structured communication system. At times, the workforce can sense patterns and peculiarities in routine activities. Hence, corrective action can be taken before further damage occurs. Finally, it is always best to strike at the roots. Any fool proof system to be designed for security is best