Cyber security is one of the critical issues in the faces of the US today.

Cyber security is one of the critical issues in the faces of the US today. The US face
significant cyber security threats which are jeopardizing the critical infrastructures of the
America, economic viability of US business and the American freedom they exercise online.
Most companies gradually are computerising their operations and thus have increased the
impact of cyber security. Cyber security is important due to increasing sophistication and
volume of threats including data theft, targeting phishing scams and other online
vulnerabilities and this demand the need to be vigilant in securing the systems and
information. Cybercrime must be a priority as it impacts day to day activities, there is a
social, cyber and digital element in every crime and police operations.
Cybercrimes are committed through; password cracking, illegitimate website system, SPAM,
networking scanning software and wireless networking technology that poses the greatest
problem as unsecured network is hacked using simple radio antenna, cell phone or PDA.
Hackers have different reason in performing cybercrimes including; revenge, financial gain,
protest, gathering trophies, identity theft, criminal activity and forging documents and
messages. Prevention is better than cure and thus there is need to prevent frustrations and loss
of data leading to a need in ensuring the PC is protected from malicious computer viruses.
The cyber security status quo has been unstable especially while considering the growing
scope of these threats. In mitigating these threats, this paper will give a framework for actions
that will harness the US power in industry and ingenuity through safeguarding the privacy
and freedom of individual citizens. Through this dynamic research, cyber space can be made
safer as failure to take action will leave the US vulnerable to most threats. Cyber-crimes have
great impact, it can hurt small businesses without just targeting money but the data is the
most important target and the cyber criminals also target police departments. Police
departments are faced with challenges, many people fail to report these crimes, the crime is

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

underemphasized by the traditional measures and many organisations do not admit that they
are hacked.
The study will examine the approaches to cybercrimes and the best holistic approach to
follow. The significance of this study is the information retrieved will combat the unprotected
computers connected to the internt that can be compromised due to its vulnerability.
Development of large open network has led to increased security threats in the past 20years
with hackers developing more network vulnerabilities through downloading application
requiring no or little hacking knowledge on implementing, intended trouble shooting
applications, optimizing and maintaining network can pose severe threats and used
maliciously
The purpose of this project is to discuss the effectiveness of the American cyber security
policies in curbing and reducing cybercrimes. The study aims at searching and discussing the
cyber security policies that the government is using and effects of the policies on crimes. It
will explore any gaps available in the policies of curbing the increasing cybercrimes. Both
qualitative and quantitative research methodologies will be used in collecting data. Collecting
tools like questionnaires, surveys and secondary information such as newspapers, journals,
books and the internet will be used.
Analysis of the carried research will reveal the different policies that the government is
utilizing effectively and those that are failing. The research will expand the knowledge gained
and ideas can be used by policy makers and used for other research baselines. The analysed
data and will give conclusions that will give promising policies that are to be used by the
cyber security departments that control the cybercrimes and how each department act. The
research will be integrated and look at individual cybercrimes, organisational both public and

private and taskforces that follow. Due to the distance between the hacker and the victim,
(most cases far), implementing these forces may be insignificant.
Content analysis will help in delivering the past success of policies in cybercrime. Interviews
and questionnaire will illustrate the effectiveness of the policies, and give any gaps available
in solving the mystery. The research is combining both qualitative and quantitative methods
thus it will use different data analyses methods. The qualitative data will be analysed by use
of mathematical and statistical methods and techniques. The national plan on combating
cybercrime is an important tool in this research where the priorities will be used as a
guideline on the effectiveness of cyber security policies.

TABLE OF CONTENTS

COPYRIGHT…………………………………………………………………… Ii

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

DEDICATION…………………………………………………………………… iii

ACKNOWLEDGEMENTS……………………………………………………… iv

ABSTRACT……………………………………………………………………… V

TABLE OF CONTENTS………………………………………………………… vi

LIST OF TABLES……………………………………………………………… vii

LIST OF FIGURES……………………………………………………………… viii

CHAPTER PAG
E

I. INTRODUCTION…………………………………………………………

Problem statement………………………………………………

Statement of Purpose……………………………………………….

Research Questions…………………………………………………..

Importance of the Study……………………………………………

Definition of Terms…………………………………………………

1

2

3

4

5

6

Limitations………………………………………………………….

Assumptions………………………………………………….……

Theoretical Framework………………………………………………

7

8

9

II. LITERATURE REVIEW……………………………………………………

Cyber security policies………………….………………………………

Importance of cyber security………………………………………………

Effects of cybercrime……………………………………………………..

Prevention of cyber-attacks……………………..………………………….

Cybercrime strategies……………………………..………………………
10

11

12

13

14

15

Effectiveness of cyber securities policies……………………………… 16

III. METHODOLOGY…………………………………………………………

Subjects and Setting………………………………………………….

Data Collection Technique………………………….……………….

Hypothesis……………………………………………………………

Statistical Analysis…………………………………………………

Limitations of Study…………………………………………………

17

18

19

20

21

22

IV
.
RESULTS………………………………………………………………………

Analysis of Data……………………………………………………

23

24

Hackers proximity………………………………………………………

Impact of policies……………………………………………………….

Prevention and strategies impact…….…………………………………

Tables, Figures, Diagrams ………………………………………….

25

26

27

28

V. DISCUSSION…………………………………………………………

Summary……………………………………………………………………..

Conclusion …………………………………………………………………

Recommendations……………………………………………………………

29

30

31

32

LIST OF REFERENCES………………………………………………………… 33

APPENDICES…………………………………………………………………… 34

Place your order
(550 words)

Approximate price: $22

Homework help cost calculator

600 words
We'll send you the complete homework by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 customer support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • 4 hour deadline
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 300 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more