Order Now

Research Report

Category:

No matching category found.

0 / 5. 0

Words: 275

Pages: 1

224

Student’s Name
Professor’s Name
Course
Date
Research Report
In 2013, Edward Snowden copied and leaked to the word the classified information from the National Security Agency (Zajko 40). The documents revealed to the world the surveillance programs by the Five Eyes which comprised of the US, UK, Canada, Australia, and New Zealand. The paper by Zajko examines the Five Eyes as a threat to IT security and IT security as an opposition to the programs. One of Zajko assertions is that the Five Eyes agencies are a methodical compromise of the technologies, networks, and standards being used all over the world (Zajko 42).
Cyber attacks on internal infrastructure are against the defensive stance of these agencies but align with the cybersecurity plan as defined by the Five Eyes. The cyber security plan of the Five Eyes countries is extensive in scope and has ensued along risky lines. Their purpose gives the intelligence agencies two contradictory roles of both exploiting IT systems and at the same time securing the systems (Zajko 45).
Zajko suggests the use of a comprehensive response that comprises both civil and legal reforms that separate the Five Eyes’ offensive and defensive objectives and narrows the scope of the cybersecurity plan (Zajko 49). Nonetheless, the most effective types of resistance for people and organizations to this point has been via the increased stress on IT security practices. The documents Snowden released amplified the suspicion of cybersecurity efforts endorsed by the state and reintroduced stress on the ignored significance of IT security (Zajko 50).

Wait! Research Report paper is just an example!

Since IT security is heavily bounded and technical, it cannot offer the values required to surpass the resistance. IT security does not question the politics of the world nor does it have an intrinsic partiality to openness. Zajko believes the challenge lies in ensuring both privacy and security are not restricted but work to help serve a higher value.

Works Cited
Zajko, Mike. “Security against Surveillance: IT Security as Resistance to Pervasive Surveillance.” Surveillance & Society16.1 (2018).

Get quality help now

Mike O’Sullivan

5.0 (278 reviews)

Recent reviews about this Writer

Thanks to AnyCustomWriting, I managed to boost my grades in Marketing which used to be a challenging discipline with a lot of writing assignments. Highly recommend this company and its writers!

View profile

Related Essays

Tax Law

Pages: 1

(550 words)

the refugees

Pages: 4

(1100 words)

Same writer

Pages: 8

(2200 words)

Women in Australia

Pages: 4

(1100 words)

Studying Abroad: Australia, Perth

Pages: 3

(785 words)

Cultural and Ethnic Studies Revised

Pages: 6

(1650 words)

Business Ethics and Laws

Pages: 2

(550 words)