Professional Documents
Culture Documents
The Post Has An Outline of Bibliography Hat Truly Support Information Framework and Surveillance Processes - Edited
The Post Has An Outline of Bibliography Hat Truly Support Information Framework and Surveillance Processes - Edited
Student name
Professor
Course date
NETWORK SECURITY DISCUSSION RESPONSE 2
Response 1
The post has outlined different articles that truly support information ethics and
surveillance processes. I must agree that privacy and surveillance have taken people's attention
because of the massive raids and threats posed by government and attackers who comprise stored
data. For instance, Snowden was among the Americans who exposed government ill intentions
to surveillance data without users' consent. For a fact, wen account on everything that we do on a
network. Increased data utilization and practical procedures of monitoring are of great
importance.
Nevertheless, the surveillance can affect privacy and confidentiality if it does not follow
protected and based on the law processes. In case of a search, the court order should be valid and
must not contradict integrity and personality. Communication companies should well manage
personal bases commination with allot independence. In my opinion, the surveillance has
References
Response 2
Surveillance and privacy are part of the government, monitoring process that assures
enhanced security infrastructure. Nevertheless, the decline of procedures and violations of the
surveillance Act should be handled as a crime that undermined the rule of law. I must admit that
reduced privacy procedure and uncontrolled surveillance has resulted in attacks. As outlined,
when the government has enhanced monitoring, there is an advanced data tracking and launching
of the response framework. On the broader scope, the surveillance state boost perception and
notion framework associated with data transformation. (Timan, 2017) has genuinely given an
accurate picture and theoretical framework on the need to regulate surveillance and assurance.
As elaborated, data breaches harm the data. Upon attack, insertion, deletion, and compromise
can deny service delivery. In this case, we share the same though on monitoring behavior.
significant way.
NETWORK SECURITY DISCUSSION RESPONSE 5
References