Saturday, December 28, 2019

MK Ultra Inside the CIAs Mind Control Program

Project MK-Ultra was a series of CIA-led experiments on mind control. The experiments began in 1953 and continued into the late 1960s. CIA researchers subjected thousands of U.S. and Canadian citizens to experimental tests, including electric shock therapy, brain surgery, and LSD dosing, in order to identify methods for controlling human behavior. Key Takeaways: Project MK-Ultra Project MK-Ultra was a series of CIA-led experiments on mind control.The most famous MK-Ultra experiments involved LSD, but the program also tested the effectiveness of hypnosis, electroshock therapy, and brain surgeries.The experiments were conducted without the full consent of the subjects. Many subjects were in vulnerable positions like incarceration or psychiatric treatment.The federal government was brought to trial several times as a result of the project.Concerns about Project MK-Ultra led to an executive order stating that experiences with human subjects must require affirmative consent. The CIA hoped that successful methods could be used as interrogation tactics for alleged criminals or prisoners of war. These experiments were conducted without full consent of the participants, and the federal government was sued and brought to trial multiple times over the resulting deaths and injuries. Origins of Project MK-Ultra In 1953, Allen Dulles, then-director of the CIA, initiated the MK-Ultra program. The reasoning was three-fold. First, U.S. intelligence had learned that Russia was testing a drug, bulbocapnine, which was said to affect willpower in order to extract information from a subject. Second, during the  Korean War, North Korea had used LSD as an interrogation method of U.S. prisoners of war, and the U.S. sought to identify methods to counter such a tactic. Third, the U.S. no longer had a  monopoly on nuclear weapons, and therefore wanted new methods to influence leaders and extract information.   Sidney Gottlieb, an American chemist who was known to take LSD himself, presided over the program as the chief of the CIA’s technical services. The experiments primarily took place at penitentiaries, hospitals, and universities, targeting â€Å"people who could not fight back.† Patients and inmates were given doses of LSD and other hallucinogenic drugs or subjected to electric shocks without consent, then examined for changes in behavior. Additionally, the CIA hired sex workers to dose unsuspecting clients in brothels (known as  Operation Midnight Climax) and even dosed their own agents during the period of experimentation. The Experiments The most famous MK-Ultra experiments involved LSD, but the program also tested the effectiveness of hypnosis, electroshock therapy, and brain surgeries. Because the CIA later destroyed documents relating to MK-Ultra, most of what we know about the experiments comes from testimonies provided by experiment subjects. Farrell Kirk, a plaintiff in one of the lawsuits against the CIA, stated that the experiments with LSD caused him to experience extreme depression and drove him to attempt suicide. After his suicide attempts, he was questioned and studied again, then placed into solitary confinement. James Knight, who had been incarcerated for liquor smuggling, explained that the experiments gave him violent tendencies and severe memory loss. Before the experiments, all of his arrests were for non-violent offenses, but afterwards, he was arrested multiple times for assault. One particularly famous subject in the MK-Ultra experiments was Whitey Bulger, a Boston crime boss. Bulger alleges that, while incarcerated in an Atlanta penitentiary, he was a subject in experiments related to schizophrenia. Along with eight or nine other inmates, he was dosed with LSD and asked about crimes he may or may not have committed. Bulger described a rise in his own violent tendencies after the LSD experiments, as well as hallucinations and difficulty sleeping. Ted Kaczynski—better known as The Unabomber, who killed three and injured 23 with homemade bombs—was a subject of MK-Ultra tests while a student at Harvard University in 1958. Dr. Henry Murray tested his theories of behavioral modification and mind control on dozens of students like Kaczynski by subjecting them to extreme verbal abuse and then monitoring their reactions. Associated Deaths At least two deaths are directly associated with the MK-Ultra experiments: those of Frank Olson and Harold Blauer.  Olson, bacteriologist for the CIAs Camp Detrick in Maryland, was unwittingly laced with LSD while at a CIA retreat. Due to his increased paranoia, he was sent to New York to be treated by a CIA psychologist. On November 28, 1953, he died after either falling or jumping out of a 13th-floor window. Olson’s family was initially told of the suicide but not of the experiments. There is speculation that members of the CIA pushed Olson, but the initial cause of death was ruled a suicide, then changed to an accidental death. The Olson family brought a lawsuit against the U.S. government for the experimentation leading to Frank’s death, but they settled out of court. Harold Blauer  was a patient at New York State Psychiatric Institute who voluntarily admitted himself to be treated for depression. While in treatment, he was unknowingly dosed with mescaline derivatives, one of which turned out to be a fatal dose. The institute identified his cause of death as self-inflicted overdose. Blauers family sued the hospital for neglecting to monitor his medications. After the MK-Ultra program came to light, the family was informed that Blauer’s death was a result of the experimentation. Trials and Aftermath Because the test subjects were either partly or entirely unaware of the experiments, and because the tests resulted in a number of deaths and injuries, the federal government was sued and brought to trial several times over MK-Ultra. After the  Watergate scandal led to greater overall scrutiny of government processes, the CIA destroyed many documents related to MK-Ultra. By the time of the trials a few years later, there was not much paper evidence of the illegal experimentation. In 1974,  The New York Times  published an  article  about the CIA directing nonconsensual mind control experiments. The report led to the creation of the  Church Committee  to investigate the nation’s intelligence gathering program and hold Senate hearings. Victims of the experiments filed lawsuits against the federal government for human rights violations and neglect. These efforts led President Ronald Reagan to sign  Executive Order 12333, which  stated that research with human subjects must require affirmative consent with documentation describing exactly what the subjects are consenting to. The CIA publicly announced that MK-Ultra experiments had been terminated. The MK-Ultra project led to immense distrust of the federal government and is central to many conspiracy theories about politicians and intelligence agencies in the U.S. Sources M. Hersh, Seymour. â€Å"HUGE C.I.A. OPERATION REPORTED IN U.S. AGAINST ANTIWAR FORCES, OTHER DISSIDENTS IN NIXON YEARS.†Ã‚  The New York Times, The New York Times, 22 Dec. 1974, www.nytimes.com/1974/12/22/archives/huge-cia-operation-reported-in-u-s-against-antiwar-forces-other.html.Anderson, Jack. â€Å"Lawsuit Forces CIA Confession on MK-ULTRA.†Ã‚  Washington Post, 28 Aug. 1982.

Friday, December 20, 2019

The Biblical Passage Of Jesus - 1411 Words

Throughout the Gospel we are exposed to the notions of materialism and wealth and we can see how it is easy for this emphasis on such temptations to colour and erode the spiritual priority that should characterize the church (AG, 2014). In the biblical passage, Jesus reminds the rich young man that obedience to the Ten Commandments is necessary in order to â€Å"inherit eternal life†. The Commandments are essential points of reference if we are to live in love, to distinguish clearly between good and evil, and to build a life plan that is solid and enduring. Jesus is asking us too, whether we know the Commandments, whether we are trying to form our conscience according to God’s law, and putting the Commandments into practice (Benedict XVI, 2010). The rich young man was seeking to enter the eternal kingdom of heaven, and although he had kept the Commandments, what was keeping the rich young man from spiritual perfection was his love of money. As the apostle Paul wrote, à ¢â‚¬Å"For the love of money is a root of all kinds of evil. Some people, eager for money, have wandered from the faith and pierced themselves with many grief’s† (1 Timothy 6:10). Jesus, who lived his life in humility and obscurity, never accumulating wealth or possessions (AG, 2014), asked the young man, â€Å"Go, sell your possessions and give to the poor, and then you will have treasure in heaven†. Whatever is standing in our way, keeping us from perfection and maturity is an obstacle that can keep us out of the kingdom ofShow MoreRelatedBibl 3501241 Words   |  5 PagesWrite out what the passage meant for the biblical audience using past tense verbs and refer to the biblical audience.)p.42 2) Measure the width of the river to the cross. (differences in culture, language, situation, time, and covenant)(You will take a good hard look at the river and determine just how wide it is for the passage you are studying and look for differences in situations of today and the situation of the biblical audience. If you are studying an OT passage, also be sure to identifyRead MoreThe Misunderstood Jew : The Church And The Scandal Of The Jewish Jesus Essay1466 Words   |  6 PagesThe Church and the Scandal of the Jewish Jesus proves to be a highly informative resource when trying to understand the intricate relationship between Christianity and Judaism. Levine’s primary objective seems to be a desire to address the idea that there is a vast, irreconcilable disparity between the beliefs and practices of Christians and Jews. Levine’s central argument focuses upon a common misperception of this dissimilarity: it is the result of Jesus being in direct opposition to Ju daism. FurthermoreRead More Biblical References in Grapes of Wrath Essay1287 Words   |  6 PagesIn his novel Grapes of Wrath, John Steinbeck integrated many biblical references and values throughout the book. This provided a more intriguing and complex style of writing that he used to tell about the Dust Bowl of the early 1900’s and the arduous journey the Joad family and many others took to reach California. The first biblical reference is revealed when the Joad family leaves for California. â€Å"the rest swarmed up on top of the load, Connie and Rose of Sharon, Pa and Uncle John, Ruthie andRead MoreChristians Should Study Greek Philosophy893 Words   |  4 PagesChristianity, there have been many different ideas on how a Christian should interact with the world in which they lived. From the biblical writings of The Gospel according to Matthew, and The Acts of the Apostles, to the non-biblical writings of On Philosophy, and The Prescription Against Heretics, the ideas of Christianity were brought together. The two non-biblical documents highlight the arguments of whether or not Christians should study Greek philosophy. The books from The Bible showed thatRead MoreThe Biblical Inspiration Of The Sacred Scripture1636 Words   |  7 PagesThe Biblical Inspiration Inspiration of the Sacred Scripture God is the absolute Being: â€Å"He has made everything suitable for its time; moreover he has put a sense of past and future into their minds† (Ecclesiastes 3:11). God reveals himself to humanity particularly through human language . Divine Revelation is personal and relational. The meaning of God’s revelation is included his words and actions given for the salvation of humanity. Interestingly, â€Å"revelation is rooted in the oral proclamationRead MoreThe Most Influential Text is the Bible1558 Words   |  6 Pagesfound within the Bible is the concept of leprosy. The Bible mentions leprosy in a variety of places, which include segments from both the Old Testament and the New Testament. From the book of Exodus to the Holy Gospels of Jesus Christ, leprosy is an ever-present aspect of biblical society. The sufferers of leprosy in the Bible often fall under extreme social chastisement and are commonly subject to segregation from society in accordance with ancient scr ipture (Leviticus 13.46 New Revised Standard Version)Read MoreDo Not Worry from the Gospel of Matthew Essay1114 Words   |  5 PagesDo Not Worry from the Gospel of Matthew This excerpt from the passage of Do Not Worry, from the Gospel of Matthew deals with issues such as faith, single-mindedness and worrying. Faith is an important part of this passage. To the people of biblical times, this passage spoke out a certain message -- whoever has faith, will be taken care of by God. He will know who has been faithful and believes in him and He will take care of them. God takes care of things as insignificant as lilies andRead MoreThe Between Moses And Jesus1719 Words   |  7 Pagesand placed Mosaic motifs along with the story of Jesus of Nazareth. In doing so, the parallel between Moses and Jesus is a dominant theme that makes the New Testament both slightly predictable while also reinforcing Jesus’s role as the â€Å"lawgiver.† This archetype is interesting because religion is dominated by rules, and at the most basic level, the prophets created the rules in which followers of religion live by. The link between Moses and Jesus is inextricable and undeniable, causing the relationshipRead MoreThe Religion Of Jesus Christ Is True God And True Man1735 Words   |  7 Pagesis that Jesus was born both and lived as both completely man and completely divine. This idea of Jesus being a unity of completely God and completely human is referred to in the Catholic faith as the â€Å"hypostatic union†. Per the catechism, the statement on the hypostatic union is, â€Å"He became truly man while remaining truly God. Jesus Christ is true God and true man.† This belief is one of the key statements in the Nicene Creed, which is the Catholic profession of faith. The belief that Jesus was twoRead MoreSlavery : A Rough Draft1315 Words   |  6 Pageslesser people. They were forced to work without pay, in one of the most unforgiving occupations, farming. All this because of where they were from and the color of their skin. Despite this, many people actually defended slavery using the bible. Passages such as St. Paul’s Letter to the Colossians approves slaves where he writes, â€Å"Slaves, obey your human master in everything, not only when being watc hed, as currying favor, but in simplicity of heart, fearing the Lord.† However, due to the inhumanity

Thursday, December 12, 2019

Policing Cyber Crime Cyberspace Infrastructure

Question: Describe about the Policing Cyber Crime for Cyberspace Infrastructure. Answer: The previous research conducted on the existing subject reflects that the cyberspace and its underlying infrastructure are highly vulnerable to the wider range of risk stemming from the cyber threats and hazards. In the circumstance of the similar statement, it is inferred that the sophisticated cyber actors and the nations states tend to exploit the vulnerabilities if the technical manipulations[1]. Therefore, the current records signify that the percentages of the cyber securities in the global context have increased at a rapid pace. The cyberspace is particularly difficult to secure due to the discrepancies like the linkage between cyberspaces and the physical system. Moreover, complexity in reducing the vulnerability and the consequences in the complex cyber networks has also been the primary reason which tends encourages the occurrence of the cyber crime. The worldwide cyber security market is defined by the market size that is estimated between the ranges of $77 billion in 2015 6 to $ 170 billion in 2020[2]. The Venture Capitalist firms have proclaimed the indifferent recent hundred-million dollar plus cyber security speculation funds during the year 2015. The corporate investors have been identified as the major funding sources for the cyber security start-ups, alongside the Venture Capitalist firms. For example, the US governing authority has managed to spend $100 billion in the cyber security matter. The past records show that the government has kept a budget for $14 billion for the cyber security purpose[3]. The previous records reflect that the cyber attacks are costing the ventures $400 - $500 billion per year, it does not even include the large percentages of the cyber attacks that are not even registered. Moreover, the Heatbleed has been recognised as the catastrophic security bug, which led the entire IT (Information Technology) to experience a strong by the end of 2014[4]. Therefore, the current study evaluates on the concept of privacy that has become redundant of the present age. It aims to finds out the security measures the administrative authority is taking to increase the cyber-related standards. The government has set up a cyber forensic training in different regions. In the collaboration with the Data Security Council, the cyber forensic labs have been set up to track the exact rate of the cyber discrepancies. Different organisations are taking the initiatives of providing the online training to the employees to increase the expertise regarding the data security measures. The specific approach can benefit the enterprises to understand the cyber threats and the online frauds[5]. It has been inferred that the government has started working with the leading industry partners to advance the free e-learning courses to enlighten the internal members of the organisations to increase the awareness regarding the cyber-related threats. In the different situation, it has been assessed the competitors manage to introduce the similar types of products in the market at a lower price range[6]. The specific action occurs due to the ineffective cyber security measures within the organisations. The data and the products related formulas often get leaked in the market. Therefore, the competitors receive the benefits of receiving better reactions with fewer percentages of efforts. The past records signify that the government of different regions have managed to launch the BIS Cyber Essentials accreditation scheme in the year 2014. The specific installation helps to demonstrate the cyber resilience concept. The specific scheme has been designed to support the basic set of the security standards to prevent the major forms of the common attacks[7]. The strategy of introducing the accreditation also leads to encouraging the consumer confidence within the business. In 2014, the digital sector witnessed the launch ofCyber Streetwise,the campaign that is primarily intended for improving the cyber security amongst the public and SMEs (Small Medium Enterprises). The specific set of the campaign might extend to facilitate the larger businesses for reducing the adversities of the online fraud. Law and accountancy enterprises are the attractive sources of information for the criminal based activities. The past researches conducted by the professionals reflect that the property information, sensitive client data and the commercial data are majorly targeted. The survey conducted in 2014 by Information Security Breaches, bespoke by the Department for Business, found that 81% of large enterprises and 60% of small firms have been a victim of the security breach during the tenure of the previous year[8]. The average expenditure of an enterprises' worst breach has been between the range of 65,000 and 115,000, for the small businesses. The leading Giants have to invest between the figure of 600,000 and 1.15 million for large organisations. With the emerging speed of the internet access, the attack attempts have also increased simultaneously. The existing report of the current digital situation states that the maximum percentages of the population are exchanging the conversation through the internet mediums[9]. The social networking sites have become the most efficient and the widely used platforms that increase the communication methods between the individuals. However, high percentages of the population trends have grown excessive knowledge regarding the programming language and the digital specifications. Therefore, the certain percentages of the populations are leading to make misuse of the internet based knowledge. During the year 1989, Robert Morris set free the fist computer virus on the internet platform, which led to destroy several computers in the similar point of time[10]. Luckily, in the late 80s, the internet has not been a high part day-to-day life as it is now, and thus, the effects have not been pronoun ced as the current period. The worm virus has become the first crime, which has been convicted under the legal statement of 1986 Computer Fraud and Abuse Act.The virus case has managed to gain the publicity after a certain unleashes of the early viruses. The records reflect that the worm had been unleashed in the early 1980s, which is similar to the Brain virus of the year 1986. The recent data signify that the credit card details have become extremely vulnerable due to the huge amount of online banking and shopping transaction. The data has become extremely vulnerable. The credit and the debit cards are almost used by 70% of the worlds population[11]. Moreover, the populations are always remaining in a certain rush, which often tends the majority of the users to fail to implement the security process. Therefore, due to the certain discrepancy in the security process, the hackers get the opportunities of misusing the e-information. The final users become the victim of the cyber crime. The governing authorities are taking different advanced measures to stop the cyber-based crimes in the similar context[12]. The research was done by certain scholars conveyed that the UK government has taken several initiatives to increase the cyber security measures. For example, the UK government has already conducted the Cyber Streetwise camping to reduce the cyber-related crimes[13]. The specific campaign has been initiated to spread the precautionary measures, which can often increase the awareness amongst the population. The specific campaign has involved various IT professionals to design the event layouts. The specific aspects have helped the governments to increase the awareness by promoting the further probable mistakes that often leads the populations to be the victim of the cyber crimes. Moreover, the government has already set a target of 2 billion of the cyber security exports in the year 2016. The specific initiation has been taken by forming joint venture initiatives by the cyber growth partnership to establish the cyber security business cluster in the internal region. The government has also promoted the cyber security expertise in the international market to reduce the discrepancies. A clear trend of cyber attack has emerged in the past couple of years. The cyber attackers are increasingly target the important data such as business deals, mergers, property deals and the contracts. For an example the point of sale interruption, denial of service attacks and the web application attacks are majorly responsible for 76% of cyber security incidents in case of the retail industry [14]. Inference can be drawn from the latter context that the figure of expenditure in military protection around the web application attacks, payment card duplication and rejection of service attacks, most of the financial services firms can cover 75% of cyber security incidents[15]. Supervisory Control and Data Acquisition (SCADA) system are one of the major methods in cyber security risk assessment. The SCADA is a type of Industrial Control System (ICS) that controls the process in the industrial sector[16]. This process is helpful to identify the threats that enable most of the security att acks. It has been identified that there several threat patterns that the users faced due to the issues of cyber security. Majority of the threat patterns are as follows: Malware aimed Insider misuse Physical theft or loss Web app attacks Denial of service attacks Cyber spying Point-of-sale interruption Payment card skimmers Apart from this, there are several errors such as sending an email to the wrong personnel. While most of the organisations are deteriorating to keep up the cyber crime, the latest report on cyber crime indicates that big data analytics can reduce the security risk. By adopting the big data analytics into the security risk management, the organisation can turn the wave[17]. Therefore, this approach becomes helpful to the organisation to identify contravene for reducing the time of attackers. This process is helpful to infiltrate the data which is undetected. The cyber spinning is more complex and diverse in nature is continuously increasing since 2007. For an instance, since 2013, China continues to lead in cyber spinning as the most of the website faces the espionage activity [18]. Adding to this, the Eastern Europe region faces the 20% cyber spinning attacks. It has been observed that the Distributed Denial of Service (DDoS) attacks to make the networks and subsystem inaccessible so that the website becomes useless. This type of problems are very frequent to the retail, financial services, information, professional and public sector industries[19]. The NetFlow protocol originated in the 90s is an essential for networking equipment like the routers in order to precise the information on IP (Internet Protocol) activity. MTD system theory is based on the concept of a configurable system which is defined as the configuration parameters. Each configurable system is the aggregation of the current system for all the configuration parameters related to the MTD system. As per the scholars, an MTD system allows to modify the values of the configuration parameters within the configuration state[20]. The MTD system theory is an adaptive system that captures the goal both for the operational and security measures. It has been speculated that adaptations are defined as a sequence of actions to change the system from the starting configuration state to another suitable configuration state. The fundamental system definition of MTD system theory is varied for different cyber security circles. Configuration is one of the first steps that set the valid states of MTD system. The concepts of diversification indicate the diversified system spaces while configuring the system[21]. The randomization helps to randomise th e techniques to adapt the system configuration for improving the system effectiveness. Furthermore, the success of the cyber attack theory depends on its information possessed by the attacker when the attack is commenced. Thus, it has been revealed that information is one of the essential elements of the theory of any cyber attacks [22]. The MTD system theory includes the notion of the configuration of the parameters that incarcerate the information about the configuration of the computer system. Cyber Attack Theory defines the attacks and the attackers knowledge regarding the information parameters [23]. The association between an MTD system's configuration parameters and attack's information parameters, the system administrator, can officially analyse the interactions between the attackers and MTD systems. The operational cyber security theory describes how an organisation develops and maintains a measurement of a program regarding the security. For an instance ISO/IEC standard, 27000-4 and NISTs security metric guide are the potential examples of operational cyber security theory. Adding to this, a general qualitative models has presented over there to describe the set of variables and the required concepts in the security domain [24]. The CORAS consists with a metamodel over the security field to support the security system. For an example, it has been identified that the qualitative model has a special attention on SCADA (Supervisory Control and Data Acquisition) systems to control the complete energy system. Thus, an inference can be drawn that these methods, security metamodels, technical references and the conceptual can support the cyber security assessment program [25]. It is also helpful to define the operational cyber security metrics. Therefore, it can be inferred that IT sy stem cyber security is also important to assess the cyber security measures. The examples of the operational cyber security theory include attack trees, threat trees, protection trees and defence trees attack [26]. Furthermore, the theory of combined cybers security values of a single system to a value for a different system-of-systems. It works as a network and actual trees together for the attack success probabilities. The operational cyber security theory has an inherent quantitative constituent that makes the metrication and estimates the required effort to achieve an attack in a straightforward way. The rapid technological development has provided a vast area of new opportunity and the potential sources for all types of organisation. The Cyber Security is the protection of the system, networks and the data in cyberspace. It is essential to preserve the critical security system of the business. It has been observed that the cyber security industry is growing rapidly. More malware, viruses are being launched by the hackers and specialists day by day [27]. The current statistics indicates that 230,000 new malware samples are being launched on a regular basis [28]. Thus, the more potential resources are being deployed for the counter cyber attacks. The following facts describe the current cyber security related information and problems to define the current information security landscape. Amongst the several facts of cyber crime, one of essential facts is the estimated annual cost for the cyber crime which is almost up to 100 billion dollars. These types of monetary fund come to the hackers by targeting the corporations, banks, other wealthy celebrities and even the individual general users. The Zero Day attack is one of the most powerful malware warnings that can be very dangerous for the users [29]. In this current scenario, it has been guided by the different scholars that the users require to keep up to date the software and the news regarding the cyber security system. It is expected that this process would be helpful to identify the cyber attack for securing the financial and confidential information. Furthermore, the most expensive computer virus is MyDoom which was identified in 2004. This is one of the most expensive fastest spreading email worms across the world. It has been speculated that the estimated financial damage for this virus is $38.5 billion [30]. MyDoom is transmitted via email and hidden as spam email. The cybercriminals get access to the personal computer through this virus. In the addition, the social media is the other option that is the most favourite place for the hackers. The in-depth statistic reflects that more than 1.6 billion social network users are there in the worldwide and more than 64% are the users of the internet and have chances to get infected though email worm and viruses [31]. The link-jacking, phishing and the social spam are the most unwanted problems faced by the users while the people used the social media option. The past scholars advised that do not click on any strange link could be the feasible decision to avoid the cyber attack on soc ial media. Policing in cyber security is significant apart from the Policing Suite of programmes. This programme helps the student with a strong and predominant grounding in policing. The policing suit provides the opportunity for each of the students top specialise in police and policing associated with the related context. As per the opinion of the previous scholars, this is helpful to enable a more intensive understanding regarding the current context. Policing is important for the students to learn the emerging trends in the cyber crime and the international, borderless crime [32]. The evidence-based policing, crime scene and the police governance practices has to be understood by the learners. As per the knowledge of the practical example, the students are encouraged to become volunteers within the criminal justice system. For an example, the opportunities include the volunteering in local police organisation, special constable and the other offenders within the community. The local and st ate level cyber officer would have a degree in cyber security to handle the forensics and the other information networking. The telecommunication factor is one of the minor justices in this type of study. The computer networks and the technology enable the officers to create and maintain the protect law enforcement database. This contains the vital information for avoiding the cyber attack. On the other hand, the Telephony-Denial-of-Service attacks (TDoS) are the other function that maintains the standard DoS attacks. The cyber criminals follow this type of attack to extort the government agencies. Furthermore, the cyber hackers are being successful by exploiting the poor security level. The poor tracking opportunity with the spyware can create a fake employee IDs to gather all the required information. The current statistic on cyber crime indicates that 60% of the businesses are losing the valuable IP and the associated records for the problem of cyber crime [33]. The Internet of Things (IoT) introduces a new cyber security challenges and the vulnerabilities for the aircraft. In this current scenario, the annual IBM X Force Cyber Security Intelligence Index report indicates that the business industries are the most affected region for the cyber attacks [34]. The key factors that enable the attackers is the current threat landscape. The team of IBM X Force Cyber Security intelligence works dedicatedly to keep the records of the clients and the latest cyber security threats. In the context of Cyber Security Policy, the National Research Council Computer Science and Telecommunication Board provide the nexus of cyber security policy and the required public policy. The six major findings provided in the informed discussion possess the policies and the events to avoid the cyber crimes [35]. In this regards, it has been speculated that the US has invested a lot amount of money for a proactive Public Policy per cyber security. Monitoring applications with access to the data would be the best effective methods to improve the cyber securities. It has already been assessed that the applications create an enormous impact on the software. It tends to provide the business with the necessary required for the functioning and productivity purpose. The application also bears the sensitive data at risk[36]. When the IT security attempts to defend the critical information, it usually tends to include by raising up the firewalls and edifice the infrastructure around the data that the enterprise prefers to protect. After which the IT experts provides the applications access to this data. The moment the hackers look attempts to hack the data, the security measures in the database system creates an alert. This often tends to minimise the risk of the data-stealing action. A collection of the detailed logs is other precautionary measures that often tend to protect the cyber leakage actions. It is extremely important to make sure that the IT network is secure[37]. The management of the enterprise needs to be very careful enough to hand over the IT related works to the concerned employee. Since, the IT expert would have a detailed knowledge regarding the cyber transactions and the overall data of the firm. Therefore, the expert needs to receive the advice of creating an access control of the entire internal database. By establishing the specific access controls for the entire user base, the entire data can be maintained within a strict security measure[38]. Finally, the users would have the choice of expositing the sensitive data to the before the preferred account holder. Maintaining the security patches is a significant action for preventing the cyber crimes[39]. The researchers have claimed that the cyber criminals are persistently investing on new tools to hack ion the database of the existing users and mentally assaulting the users. In the same manners, the Governments are also executing a persistent effort in innovating the tools and the precautionary measures to futile the efforts of the cyber-criminals. The moment theHome Depots POS systems have been hackedin the last summer, the systems have been in the process of installing the new security patch that would have creates a complete protection over the data[40]. The maintain the entire server network protected, it is essential to make sure that both the hardware and the hardware security is up to date with its new antimalware signatures or the patches. The cyber security related framework can connect the architecture models to assess the cyber security. To the specialist audience, cyber security is important to reduce the risk of the organisation for building the capabilities in three significant areas such as prevention, detection and response. As per the view of the scholars, prevention is a most significant option for governing the problem. This process includes the installation of the fundamentals requirements and the responsibility to deal with the cyber attackers within the organisation. Thus, it is important for everyone to identify the cyber attackers efficiently. Adding to this, detection is important to monitor the incidents. It has been speculated that the organisation can strengthen the technological detection to identify the cyber attacks. On the other hand, excellent equipment facility for data mining would be helpful to detect the data traffic and the other sudden strange patterns within the data parity [41]. This pr ocess is also helpful to monitor and control the system performance within the organisation. Furthermore, being responsive is the other significant part to activate a well-designed plan to resist the cyber attackers. The organisation can only be responsible for activating and deactivating the technological module as per the requirement of the scenario. It is essential to preserve a prospective recovery plan while developing the response to make a counter attack against the cyber criminals [42]. Moreover, it is a continuous process and required more staffs to execute the plan successfully. Understanding the cyber risk is also necessary for the non-specialist person to avoid social damage. The illegal digital activities targeted the organisation and the individual personnel for making harm. The users require understanding the hacking activity and the categories of hacking to keep safe the society and the community. The users can learn various mode of cyber security through a website and from the technical personnel to keep the information safe. To avoid social media hacking users do not click on any link to the website and the personal email. The people has to follow the safe website like government registered site while making an online financial transaction [43]. This process can save the banking information and data. The most internet users need to use the anti-malware application to keep the personal computer safe from the hackers and the other cyber attackers. The use of interconnected devices and the other technical safeguards like the firewall in the home network would be an effective step to avoid the hacker's activities. Moreover, use of common sense is highly essential to be saved and the keep the data secured. The quick cyber security tips provided by the scholars demonstrate that double cheeking the appliances and the devices can raise the user awareness for the security measures. The users would also require to safe the smart TV for avoiding the hacking activities [44]. Additionally, use of trusted DNS services such as OpenDNS would be beneficial for minimising the cyber crime issues. The users also have to be very careful with the mobile devices and the personal computers. In the circumstance of the existing subject matter, the researchers have expressed that the complex server networks have penetrated towards the mobile devices. Therefore, the virtualised environment is pushing the demand for the cyber security professionals to extend the outside perimeter within the system[45]. The Smartphone revolution is throwing more complexities into the mix. The risk to secure the data and system is severely multifold, since, the customers are registering on the mobile applications by enterprise the sensitive data. The cyber criminals have the gets the personal information from the specific vulnerable applications and create harassment over the users[46]. Therefore, the engineers require designing the application software that hardly demands the sensitive information of the users. It is highly understandable that the application demands the personal information to maintain a thorough track of the user numbers using the individual applications. Therefore, the det ails of the users are highly essential to maintain the cyber securities. However, the hackers are targeting on the specific set of the personal information of the users and leading to humiliation. 82% of the employees have reported of not having the appropriate IT experts within the business[47]. Therefore, the managements are required to train the IT professionals regarding the innovative method stat often lead to provide the premium end security services to its users. Using the secure remote access methods is highly essential to cut short on the practices of the cyber criminals. It has been assessed that the ability to connect remotely to a network has included a huge deal of expediency for the end users. However, a preventive access method, for example, the Virtual Private Network (VPN), needs to be used in case the remote access is necessitated. The VPN is considered as the encrypted data channel for the securely sending and receiving the data through the public IT infrastructure. With the support of a VPN, the users are enabled to remotely access the internal resources like printers, files, databases and the websites[48]. The specific set of the remote access can further be made strong by reducing the integer of Internet Protocol (IP) addresses. This can be obtained it by using the network devices and the firewalls to the specific IP addresses. O n the other hand, it has been inferred that the VPN is exclusively a security measure that gets con nected to devices[49]. In case a laptop or a computer gets infected with the malware can lead to introducing those vulnerabilities into the network. This often led to introduce the new infections and negating the security of the VPN. Maintaining the awareness regarding vulnerability would be the arrival of the new situation to increase the practices of the professionals. The majority of the vendors work diligently to establish the patches for recognising the vulnerabilities. However, even after the patches and the updates are released, different systems remain vulnerable due to the casual approach of the management towards the server related issues[50]. As per the Data Breach Investigations Report of 2015, the Verizon figured out that several breaches have enabled by hardly addressing the common vulnerabilities. The statistic expressed that 99.9% of exploited vulnerabilities have been compromised in the specific year after the public disclosure of the problems. Moreover, the Ciscos 2015 Annual Security Report figures out that 40% of CISO employees interviewed in a survey claimed that the company has no system patching programs in the place[51]. The specific set of the unpatched vulnerabilities often leads to incl ude the low-hanging fruit of which the cyber criminals can easily take advantage of. Enforcing policies on the mobile devices is another additional measure to uplift the cyber securities. The previous studies reflect that the proliferation of the laptops, tablets, smartphones, and other several mobile gadgets within the workplace bears the significant security challenges[52]. The mobile nature of the specific smartphone devices displays that the devices are potentially exposed to the external users, compromised with the applications and networks and malicious actors. Further supporting the certain challenge organisations are allowing the increasing trend to its employees to use the personal electronic devices for the professional purposes, which is termed as the Bring Your Own Device (BYOD) phenomenon[53]. Thus, it is highly essential to establish the policies on the verge of certain reasonable limits of mobile devices in the professional networks. The particular sets of measures need to be strictly enforced for all the employees base, as well as for the IT engineers[54]. The devices also need to be password protected to make certain that only the authorised users can log-in. I n the case of discrepancies, an unauthorised user can easily access the restricted networks and files can be misused to the authorised user's device. The preset study emphasises the importance of having security measures to reduce the rate o the cyber-related crimes. Evaluating the study, an inference can b drawn that the governing authorities of remote regions are providing the relative financial support to increase the cyber security measures. However, certain percentages of the industrial firms are taking are filing to take the precautionary measures even after receiving the virus-related symptoms. Moreover, the casual attitude of the IT experts often leads the brand to have unknown data exposure actions. Therefore, the organisations and the government need to make a persistent effort in developing the security tools to decrease the cyber-related issues. Reference: Amoroso, Edward G. Cyber Security. Kingston, NY, United States: Silicon Press, 2006. Awan, Imran and Brian Blakemore. Policing Cyber Hate, Cyber Threats and Cyber Terrorism. United Kingdom: Ashgate Publishing, 2012. Bayuk, Jennifer L. Cyber Attacks. Computers Security 31, no. 2 (March 2012): 251. Carpentier, Deborah. NERC and Enforcement Issues: NERC Gains in Vegetation Management, Cyber and Physical Security, and Reliability Assurance. Natural Gas Electricity 30, no. 10 (April 16, 2014): 2932. Chen, Dong. A Survey on Security Issues of M2M Communications in Cyber-Physical Systems. KSII Transactions on Internet and Information Systems 3, no. 2 (2012): 69103. Clarke, Richard A. and Robert K Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins Publishers, 2011. DeVilliers, Meiring. Enabling Technologies of Cyber Crime: Why Lawyers Need to Understand It. Pittsburgh Journal of Technology Law and Policy 11, no. 3 (April 1, 2011): 118. Ghernaouti, Solange and Solange Ghernaouti-Helie. Cyber Power: Crime, Conflict and Security in Cyberspace. Boca Raton, FL, United States: EFPL Press, 2013. Grabosky, Peter. Requirements of Prosecution Services to Deal with Cyber Crime. Crime, Law and Social Change 47, no. 4-5 (October 13, 2007): 20123. Greenbaum, D. Cyber Crime 2.0. Science 348, no. 6231 (April 9, 2015): 19394. Healey, Jason, Jeffrey Schmidt, Jennifer L Bayuk, Joseph Weiss, Marcus H Sachs, and Paul Rohmeyer. Cyber Security Policy Guidebook. United States: John Wiley Sons, 2012. Jones, David. Cyber-Crime How Much Is There and What Is Anyone Doing about It? Card Technology Today 19, no. 11-12 (November 2007): 16. Kizza, Joseph Migga. Computer Network Security and Cyber Ethics. New York, NY, United States: McFarland Company, 2006. Kowalski, Robin M., Susan P Limber, and Patricia W Agatston. Cyber Bullying: Bullying in the Digital Age. 2nd ed. Malden, MA: Wiley-Blackwell (an imprint of John Wiley Sons Ltd), 2012. Lehto, Martti. The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 118. Lewis, Coleen. Social Media - Cyber Trap Door to Defamation. Masaryk University Journal of Law and Technology 9, no. 1 (June 30, 2015): 3544. Li, Tao, Jiannong Cao, Junbin Liang, and Junhao Zheng. Towards Context-Aware Medical Cyber-Physical Systems: Design Methodology and a Case Study. Cyber-Physical Systems 1, no. 1 (November 10, 2014): 523. Liu, Jing, Yang Xiao, Shuhui Li, Wei Liang, and C. L. Philip Chen. Cyber Security and Privacy Issues in Smart Grids. IEEE Communications Surveys Tutorials 14, no. 4 (2012): 98197. McCusker, Rob. Transnational Organised Cyber Crime: Distinguishing Threat from Reality. Crime, Law and Social Change 46, no. 4-5 (March 23, 2007): 25773. McGuire, Mike and Samantha Dowling. Cyber Crime [electronic Resource]: A Review of the Evidence: Summary of Key Findings and Implications. United Kingdom: Home Office, 2013. Medlin, B. Dawn. Social Engineering Techniques and Password Security: International Journal of Cyber Warfare and Terrorism 3, no. 2 (2013): 5870. Mohd Ali, Maziah. Determinants of Preventing Cyber Crime: A Survey Research. International Journal of Management Science and Business Administration 2, no. 7 (2015): 1624. Pegram, Bob. 10 Alarming Cyber Security Facts That Threaten Your Data [Updated]. May 12, 2016. Accessed September 26, 2016. https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/. Power, Andrew. The Psychology of Cyber Crime: Concepts and Principles. Edited by Grainne / Kirwan. United States: Information Science Reference, 2012. Reyes, Anthony, Richard Brittson, Kevin OShea, and Jim Steel. Cyber Crime Investigations: Bridging the Gaps Between, Security Professionals, Law Enforcement, and Prosecutors. United States: Syngress Publishing, 2007. Robinson, Michael, Kevin Jones, and Helge Janicke. Cyber Warfare: Issues and Challenges. Computers Security 49, no. 2 (March 2015): 7094. Rogers, Michael. A Challenge for the Military Cyber Workforce. Military Cyber Affairs 1, no. 1 (December 2015): 22829. Seam, Neelam. Cyber Crime Against Women. IMS Manthan (The Journal of Innovations) 8, no. 2 (September 15, 2015): 4769. Security, IBM. IBM Cyber Security Intelligence Index - United States. September 19, 2016. Accessed September 26, 2016. https://www-03.ibm.com/security/data-breach/cyber-security-index.html. Shah, Niral and Naveen Vaswani. Cyber Crime and Security- Challenges and Security Mechanisms. International Journal of Engineering Trends and Technology 36, no. 7 (June 25, 2016): 36771. Shrivastava, Anshul. Cyber Security: Issues and Privacy. Communications on Applied Electronics 3, no. 4 (November 25, 2015): 1216. States, United. Cyber Security: Responding to the Threat of Cyber Crime and Terrorism: Hearing Before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, First Session, April 12, 2011. Washington: Government Printing Office, 2011. Terrorism, Nonproliferat Subcommittee on. The Evolution of Terrorist Propaganda: The Paris Attack and Social Media. San Bernardino, CA, United States: Createspace, 2015. Vacca, John R. Cyber Security and IT Infrastructure Protection. Waltham, MA: Syngress Media,U.S., 2013. Voelker, Rebecca. FDA Tackles Cyber Drug Crime. JAMA 316, no. 5 (August 2, 2016): 48586. Wang, Shiuh-Jeng. Measures of Retaining Digital Evidence to Prosecute Computer-Based Cyber-Crimes. Computer Standards Interfaces 29, no. 2 (February 2007): 21623. Yeboah-Boateng, Ezer Osei and Elvis Akwa-Bonsu. Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-Crimes. Journal of Cyber Security and Mobility 4, no. 2 (2016): 87104. Zhang, Yanping, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, and Hongmei Deng. A Survey of Cyber Crimes. Security and Communication Networks 5, no. 4 (July 13, 2011): 42237.