1,885
11
Essay, 1 pages (250 words)

Cybersecuirty

Cyber Security   Cyber Security Topic 3 In my opinion, the response to the question represents a degree of truth in the ment. The response clearly highlights reasons why the United States of America has a lower software privacy levels compared to other areas outside America. It is true that law enforcers in countries outside America, mostly developing countries are poorly paid. This makes them corrupt and force them accept bribes. The law enforcement officials will permit business involving piracy of media materials and in some instances protect the trade. In addition, people living in these poor countries engage in any business to ensure their survival and that of their families, for example, the traffic or sell fake or pirated materials to get money. Also, there are little or no laws opposing piracy of materials or their laws are weak. Moreover, American laws cannot be enforced outside America. All these factors make software piracy levels elevated outside America.
Topic 4
In my view, the first part of the response is biased. In disputing the SIMTRAY’s justification of hacking on the basis of intent, it shows you do not consider both sides of the hacking issue. The hacker may be engaging in hacking as a means of meeting his daily needs. This shows, even if, the action is wrong on one part, on the other; it is a way of survival. The responses also show you have a hard time understanding how hacking relates to GDP, income ratio and collectivist nature. In addition, the reactions indicate despite going through the simulation twice, you still do not understand the remailer question.

Thank's for Your Vote!
Cybersecuirty. Page 1
Cybersecuirty. Page 2

This work, titled "Cybersecuirty" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Cybersecuirty'. 17 November.

Reference

AssignBuster. (2021, November 17). Cybersecuirty. Retrieved from https://assignbuster.com/cybersecuirty/

References

AssignBuster. 2021. "Cybersecuirty." November 17, 2021. https://assignbuster.com/cybersecuirty/.

1. AssignBuster. "Cybersecuirty." November 17, 2021. https://assignbuster.com/cybersecuirty/.


Bibliography


AssignBuster. "Cybersecuirty." November 17, 2021. https://assignbuster.com/cybersecuirty/.

Work Cited

"Cybersecuirty." AssignBuster, 17 Nov. 2021, assignbuster.com/cybersecuirty/.

Get in Touch

Please, let us know if you have any ideas on improving Cybersecuirty, or our service. We will be happy to hear what you think: [email protected]