1. The paradigm change associated with the internet has no doubt brought with it a change in the way the society interacts and a change in the way business is being conducted in the world today. It can be said that more interaction is happening among individuals than it has ever being in history. There are more avenues for people to express themselves. All these changes are brought about by developing networks and systems that are more complex and sophisticated than the ones we have had in the past (Kim, J. 2012). It has also been said that the more complex a system is, the more the vulnerable the system is. This is because there are invariably more potential loopholes that can be exploited by people of malicious intent (Dhamankar, R., et al 2009). Overall, I believe that securing these system and technologies become more important than the changes brought about in businesses and the society.
2. The internet has become more sophisticated. It has led to an increase in the use of personal information to perform tasks. This has made the process of doing business easier. However, there is always the risk of information getting into the wrong hands. The problem of identity theft has been a long running battle, which individuals and organizations have had to grapple with at one time, or the other. It has no doubt posed a serious challenge to the security of personal information on the internet (Kshetri, N 2006).
Cloud computing is a relatively new concept which is just taking root in recent times. The advantages of cloud computing are enormous, because it provides an individual access to their documents anywhere in the world. It also provides excellent backup service for vital documents (Libicki, M. C. 2009). However, it is also possible for this information to be maliciously accessed by any individual who is able to access the online servers.
References
Dhamankar, R., et al (2009). The top cyber security risks. SANS. Retrieved from Retrieved from http://www.sans.org/top-cyber-security-risks
Kim, J. (2012, January 19). Many security breaches go unreported. Fierce Compliance IT. Retrieved from http://www.fiercecomplianceit.com/story/many-security-breaches-go-unreported/2012-01-19
Kshetri, Nir (2006), “The Simple economics of cybercrimes. IEEE Security and Privacy, January/February, 33-39. Retrieved from http://see.xidian.edu.cn/hujianwei/papers/098-The%20Simple%20Economics%20of%20Cybercrimes.pdf
Libicki, M. C. (2009). The information environment. In America’s Security Role in a Changing World: Global Strategic Assessment 2009, 53-55.