The Computer World Between Continued Development And The Security Systems And Protection Laws

Read Complete Research Material



The Computer World between Continued Development And The Security Systems And Protection Laws



ACKNOWLEDGEMENTS

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

ABSTRACT

This study investigates the topic of computer world between continued development and the security systems and protection laws. The study explores the facts that there is a constant change in the information technology world and along with that the rise of protection issues in the security systems also increasing. The study thus continues to find the conclusion how the protection laws are effective in eliminating the threats of security systems.

TABLE OF CONTENTS

ACKNOWLEDGEMENTSii

DECLARATIONiii

ABSTRACTiv

CHAPTER 1: INTRODUCTION7

Research Problem7

Research Hypothesis7

Limitations of the Study8

Significance of the Study9

Summary13

CHAPTER 2: LITERATURE REVIEW16

Background16

Summary of Data Protection in THE UK16

Technology Trends19

Current Scenario20

Strategic Approach22

Security Protection law, Compliance and Assurance23

(a) Critical Information Infrastructure Protection23

(b) Security Systems Assurance Framework24

Trusted Company Certification25

Security Incident - Early Warning & Response26

(b) The essential actions under National Cyber Alert System include:26

(c) Creation and Augmentation of Response Capabilities27

(d) International cooperation and information sharing27

Security Training - Security, Digital Evidence & Forensics28

Security R&D29

Role of Government30

Summary32

CHAPTER 3: METHODOLOGY35

Qualitative Research35

Research Method35

Literature Selection Criteria36

Search Technique36

Difference37

Theoretical Framework38

CHAPTER 4: RESULTS AND DISCUSSION39

CHAPTER 5: CONCLUSION48

The Future53

REFERENCES55

CHAPTER 1: INTRODUCTION

Research Problem

When computer-based systems or the means by which these systems' electronic data are transmitted (i.e. critical information and communication technology, information technology etc.) is disrupted, the resulting problems are serious. Losing access to vital records and legal documents; losing productivity and accountability; and losing revenue are just a few of the tangible results of such a failure. One only needs to turn on the evening news or read a newspaper to know the effect a major security systems disruption has - the impact on ordinary life is far-reaching. The consequences of a systems failure are much more than an inconvenience; these events lead to public distrust, fear and confusion.

Research Hypothesis

In less than two decades, advances in information and communications technologies have revolutionized government, scientific, educational, and commercial infrastructures. Powerful personal computers, high-bandwidth and wireless networking technologies, and the widespread use of the Internet have transformed stand-alone systems and predominantly closed networks into a virtually seamless fabric of interconnectivity. The types of devices that can connect to this vast information technology (IT) infrastructure have multiplied to include not only fixed wired devices but mobile wireless ones. (Fafinski, 2007) A growing percentage of access is through always-on connections, and users and organizations are increasingly interconnected across physical and logical networks, organizational boundaries, and national borders. As the fabric of connectivity has broadened, the volume of electronic information exchanged through what is popularly known as security systems has grown dramatically and expanded beyond traditional traffic to include multimedia data, ...
Related Ads