Free Essay SamplesAbout UsContact Us Order Now

Research Report

0 / 5. 0

Words: 275

Pages: 1

103

Student’s Name
Professor’s Name
Course
Date
Research Report
In 2013, Edward Snowden copied and leaked to the word the classified information from the National Security Agency (Zajko 40). The documents revealed to the world the surveillance programs by the Five Eyes which comprised of the US, UK, Canada, Australia, and New Zealand. The paper by Zajko examines the Five Eyes as a threat to IT security and IT security as an opposition to the programs. One of Zajko assertions is that the Five Eyes agencies are a methodical compromise of the technologies, networks, and standards being used all over the world (Zajko 42).
Cyber attacks on internal infrastructure are against the defensive stance of these agencies but align with the cybersecurity plan as defined by the Five Eyes. The cyber security plan of the Five Eyes countries is extensive in scope and has ensued along risky lines. Their purpose gives the intelligence agencies two contradictory roles of both exploiting IT systems and at the same time securing the systems (Zajko 45).
Zajko suggests the use of a comprehensive response that comprises both civil and legal reforms that separate the Five Eyes’ offensive and defensive objectives and narrows the scope of the cybersecurity plan (Zajko 49). Nonetheless, the most effective types of resistance for people and organizations to this point has been via the increased stress on IT security practices. The documents Snowden released amplified the suspicion of cybersecurity efforts endorsed by the state and reintroduced stress on the ignored significance of IT security (Zajko 50).

Wait! Research Report paper is just an example!

Since IT security is heavily bounded and technical, it cannot offer the values required to surpass the resistance. IT security does not question the politics of the world nor does it have an intrinsic partiality to openness. Zajko believes the challenge lies in ensuring both privacy and security are not restricted but work to help serve a higher value.

Works Cited
Zajko, Mike. “Security against Surveillance: IT Security as Resistance to Pervasive Surveillance.” Surveillance & Society16.1 (2018).

Get quality help now

Ashley Miller

5.0 (201 reviews)

Recent reviews about this Writer

Thank you for your services, they are really helpful! I was ready to give up my term paper because I just haven’t any idea what to write about. I’ve found a couple of ideas here and finished my piece without hurdles.

View profile

Related Essays