ITM 820 Lecture 9: MODULE 9 discussion post itm820
Document Summary
Discuss some scenarios when security and privacy may clash with each other. Post your response in the discussion forum by the end of tuesday of. Week 9, and respond to at least one of your classmates by the end of. Remote cyber attacks can now target any world region, disrupting or destroying digital assets valuable information networks and physical objects. Dams, power plants, and other industrial facilities. International criminal groups run the bot armies of billions of puppet computers, which belong to unknowing victims around the world, to attack corporate systems. The attribution is clearly no easy tasks when cyber vulnerabilities are involved, thus traditional state-level deterrence strategies often prove futile. In this complex and rapidly changing security environment, many domestic and international policy-makers appear to believe that the only defense to counter these emerging threats is the increased control over population.