What type of new technology or devices do we use to protect these people’s private information from getting stolen?Explain

Hasan Alsinafi
Technical communication: Paper 1a
Due 2/25/2016
EGR 186-009
Securing cyberspace
Abstract
Securing cyberspace is a worldwide problem that involves theft of private information. The best way to deal with this problem is to either create new technology that protects ones private information from the hackers and making it impossible to breach through cyberspace or delete the information once it’s used.
Introduction
Millions of people use the internet on a daily basis. Many of those people get hacked and conned on a daily basis as well. How do we stop them from getting conned? What type of new technology or devices do we use to protect these people’s private information from getting stolen? How do we stop the hackers from hacking? What punishments must we use to force the hackers to stop hacking? Can we create a second layer in cyberspace to protect all the private information? In this paper I will try to solve and answer all of these questions?
Methods
New Technology: Creating a new piece of technology where once you put the private information inside it can’t get out without a specific key or code. Imagine a black box for cyber information. And once you try to send this private information to someone else it goes in a straight line from your end to the other person that way hackers cannot try to steal the information while it is traveling.
Creating laws that prevent hacking: Making new laws the fine and imprison hackers can cause a dramatic change. These hackers will be too scared to steal from cyberspace and might stop them from hacking. If they do not stop then you have to make an example out of one and air it worldwide to show them how serious this law is.
Punishment: Fining them for the first time might cause them to stop. If they do not stop fine them for double the amount of the first time. If they do not stop we can implement the three strike rule. The third time they hack and get caught can get them in prison for how bad the crime was.
Creating a second layer in cyberspace: Creating a second layer can protect hackers from entering and stealing information from the first layer. Specifying each layer to do certain things. For example: The first layer is for private information and payment transactions. The second layer is for general things like text messaging and using the internet for normal things. But at the same time the second layer protects the first layer from hackers and thieves.

Conclusion
Cyberspace has tons of personal information but all the information is not secured well enough. All of the information has a high chance to get stolen if the hacker wanted to steal this specific piece of information. There are methods that stop hacking from hacking into people’s private information. These methods are: Creating new technology to prevent hackers from hacking. Creating new laws and to punish hackers for hacking, and creating a second layer in cyberspace specifically for private information.

Last Completed Projects

topic title academic level Writer delivered