Understanding the Concept of Security
Hello there, in the section that states what we are consulting for, there was no option for Regional Report... this paper is a regional report. The structure we were given for this report:
1). It must be post 9/11
2). Must be treated as an academic assessment, as it requires research and organisation etc
3). Bibliography should reflect in the text/content
4). Nature of report should be broad or narrow in range, often focused on action, must be a structured document, must be a product of extensive research, should convey information and analysis, and offer conclusions (be firm, give summary of findings, inferences, avoid new idea in conclusion).
5). Include 3/4 security issues in the main body of work
6). Must look at the concept of security
7).Be tactful with how many words we dedicate to each section
8). Write this report for an informed audience, that may not know everything about the topic of the report, so the information is conveyed brilliantly to the audience
9). Offer opinions after completion of the report
10).Have a purposeful structure, ensure introduction isn't more than 250 words, justify why USA was the chosen region, signpost exactly what is being done in the report, be prideful in the bibliography by using subheadings, putting it in alphabetical order, and use peer reviewed journal articles.
Sorry it's such a long instruction list, this was what we were told. The report must be a minimum of 2000 words, the bibliograpgy and references are not included in the 2000 word count pls. Pls can the sources be a minimum of 12. Lots of thanks to you!
CYBER SECURITY
Name
Professor
Course
Institution
Due Date
Cyber Security
1.0 Introduction
As the world grows technologically, attacks on the same developments have increased. Today, attacks on smartphones, credit and debit cards, computers, and even smart houses are rampant. Technologically savvy individuals have taken it upon themselves to inflict harm and danger to people, businesses, and countries. Major companies have been on the receiving end of some of the most devastating cyberattacks in the recent past. A 2014 report by DeSimore and Horton (2014) captures the Sony hack of 2014, which made many companies rethink their cyber security status. News of this hack spread fast, and major companies saw it fit to erect measures and security features that would help prevent such an attack. Cases of data breaches can be damaging, and companies stand to lose more than revenue. Because of its status as a superpower, the U.S. has been a target for a long time. Terrorists are always plotting attacks in the country, and therefore, it is not surprising that the security measures in the country are quite comprehensive. Johnson (2021) notes that the average cost of a data breach in the U.S. stood at $8.64 million in 2020. If left unchecked, these costs will cripple businesses and render others non-existent. Therefore, this paper discusses the concept of cyber security in the U.S. by demystifying the concept of security, providing a status report on cyber security in the U.S., and sharing the measures to reduce the threat posed by cyber security.
1.1 Understanding the Concept of Security
The concept of security is quite ambiguous in its meaning. The term security has been widely contested. People have often attached different meanings to it, with some applying it to their personal needs, others to societal needs, and still others attaching some political side to it. With regard to personal needs, this mainly entails protection against personal threats. These could be physical and psychological. With reference to societal needs, the term security denotes elements like the rule of law and due process, people’s freedoms, and the provision of a conducive environment to actualize progress. Lastly, the political aspect takes the form of policy agendas that yield or push the ideals of a country or region forward. This particular aspect could entail ideals such as climate change, the war on drugs, crime, as well as external threats, for example, terrorism.
As often propagated by countries worldwide, the ideals of security take policy measures that mainly address the concepts or ideals of economics, social injustice, epidemics, the war on drugs, and the environment (Baldwin, 1997, p. 5). Questions, therefore, arise as to whether these conceptions of the term security mainly help to shed light on the different phases of security or are different aspects that drive towards fundamentally different outlooks or understanding of the term security. Regardless of the above, there is a need to note that the term security continues to metamorphose as society continues to become increasingly complex. Today, security has extended to mental health and the state of one’s environment relative to their mental health. Furthermore,...
👀 Other Visitors are Viewing These Harvard Other (Not Listed) Samples:
- Portfolios Units 2 And 3 Assessment Specification Document Essay5 pages/≈1375 words | Harvard | Social Sciences | Other (Not Listed) |
- John Stuart Mill’s Perspective of Representative Government6 pages/≈1650 words | 5 Sources | Harvard | Social Sciences | Other (Not Listed) |
- Nigeria's Portfolio: Stability Of The Country9 pages/≈2475 words | 13 Sources | Harvard | Social Sciences | Other (Not Listed) |
- Biography for a citizen and resident in the Kingdom of Saudi Arabia6 pages/≈1650 words | No Sources | Harvard | Social Sciences | Other (Not Listed) |
- Differences Of Groups In Terms Of Opportunities And Resources3 pages/≈825 words | 6 Sources | Harvard | Social Sciences | Other (Not Listed) |
- Development of Media/Social Media Campaign by Non-Governmental Organisations5 pages/≈1375 words | Harvard | Social Sciences | Other (Not Listed) |
- The Evolution of Diplomacy2 pages/≈550 words | Harvard | Social Sciences | Other (Not Listed) |