In the modern time the trend of the digitalizing the system is one of the sources which is helping many lives these days and helping the people to attain the best from the service of the digitalizing. As there is always the cost which is associated with the digitalizing because of the multiple reasons which also includes the security of the information and value of the privacy. As it is important to provide the facility to the doctors and the patients so that they will be able to use the video calling service and also use the modern system for the payment and other activities online using the internet. As the web is the millions of the computing device which are attached to each other and can communicate with each other from the distant place. The video calling service is one of the famous trends of these days which can help the medical science to be more innovative than the previous few decades. There are the major issues which are also included when it comes to the digitalizing the system and using such service for the public. As mentioned, that the security and privacy are important concerns of these days so this idea is not enough to correct to be implemented because video calling service can help the doctor and patient but the administrative cost will be going to increase in the short period of time and with the benefits is less than the cost(Martens, 2018 #2700).
After world war 2 the major issue America faces despite the other wars and terrorism is the cyber attack and it is from the same region which helped America during the world war 2 time. USSR now called Russia. As there are the people which are government funded and working against the American system using the internet. As even the trump election was being influenced by the Russian hackers who attacked the system and even run the camping for the election on the social media to make the Trump as the president. There are multiple controversies on this topic as the Russian involvement in such activities(Fuchs, Kenney et al. 2017). In addition, they are attacking the government-based institution for hacking the sensitive information from such a system so there are other activities which are also involved in these. So as the government-funded activities against the American system is at the peak and it can be damaging for the public and also can be a threat for the future. So as the rise in these activities then there is the possibility that the system can be breached with such facilities as providing the video calling service by the ports and the additional mechanism. It can provide the easy for the public to communicate with each other and also with the doctors at the distant place while it can be a threat for the public also in numerous ways.
The more interesting point to be known to us as there are multiple types of the virus is in the market forget about the trojan horse or any old virus now the virus are more advanced as an old method of the virus is to hurt the machine in the way that the person files can be hidden or changing the files but somehow not all data is being interrupted by the virus. Now a day the new technology virus includes the encryption process in which information is coded into another type of the language. It is commonly used in the security purpose but this same method is used as the virus because hackers when they get access to the system target, they had been to go to the data information and then encrypt the information into the meaningless information. As the computer codes work in the binary number system so the new code includes the slight change it is the same information but it is no more accessible to the person. These viruses recently attacked the computing system in 2013 and then in 2017 especially the Microsoft windows in which they had changed the information of the personal computers into another format and taking the ransom from the public as to recover the data. For every organization, data is most important in every case and many organizations had suffered from such virus which had attacked the system and now they are using the coded information to fund themselves and activities they do. So as there is a security threat for the public and also for the national level security. These activities are working on the internet these days and can be fatal for the computing system. So if the information is kept on the serves and also on the computers which are attached to the network then there is the chance that it can be in the access of such organization which will encrypt the data and then demand the money to be decrypted and this will cost the organization more in this regard regarding the security level and the threat to the organization. In addition, other issues include propaganda. NSA had accepted the threat from the issues related to the cybersecurity and even the meeting is held for this purpose in order to avoid the potential risk. In addition, it cost millions of dollars for the security of the digital assets which the government owns and also the private sector people already paid millions of dollars for this purpose(Nakashima and Timberg 2017).
The medical care system these systems are using the digital content already in the service to keep the data and make it easier for the patient and the operator to keep the record and the record to be fetched in no time as the requirement of these days is the rapid response from the services. Now the point is how much the hacking and the data breaches had done to the system and how much record is being affected. Almost 25% of the breaches were successful while these 363 attacks had infected the records of the 4867920 people records in the database(Ronquillo, Erik Winterholler et al. 2018). So, the system which they are using is more costive but as it provides the ease of the use and the services hence this system is being used by these services in order to facilitate the people. The hackers are the major element who are behind these activities which are a threat to the system management and the problems associated with it. There is no organization which will claim that they had the world’s best and secure system which can help them and cannot be breached by any means. So, there are multiple issues related to the security but it is the necessity of the modern time.
The cost of the operation when compared with the old system and the cost of managing the old system is more than the cost of the security it is important to consider this point that the computer safe more time and even, they are at the high risk but still they are useful. The question comes to the mind of the person that how the video call can be the threat for the computing service and the organization and what will be the cost as the previous researched it is concluded that it is a more costive solution but helpful but now the point is that the system had the effectiveness with the working capabilities the important point is that how far it can be helping the public and should be adopted or not. It should be adopted if and only if the cybersecurity level is maintained and can helping for the services to be run smoothly. Also, it is important to make the back of the data as there is a threat but also there are some solutions which can be adopted also in this manner and also those calls which are made on the phone service using the video cam should be buffered in the special purpose area so that the communication should be at the peak but also, there is no saving of the information from both ends if it is such issues then the computing technologies are enough intelligent which can protect it.
So, in conclusion, we can say that as there is a threat to the service it own choice that if we can use the system in an effective manner and can also manage it in the perfect way. Then such solutions must be adopted because it is helping the public and can provide good response for the public and provide ease. In addition, the major point is that if such service is not adopted then being in the digitalizing content cost is the same which we are already paying.
Nakashima, Ellen, and Craig Timberg. “NSA officials worried about the day its potent hacking tool would get loose. Then it did.” Washington Post (2017).
Ronquillo, Jay G., et al. “Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information.” JAMIA Open 1.1 (2018): 15-19.
Fuchs, Michael Hochman, et al. Why Americans Should Care about Russian Hacking. Center for American Progress, 2017.
Martens, Marijn, and Ralf De Wolf. “Measuring the cost and impact of cybercrime in Belgium (BCC): D3. 1.2 Risk perception monitor report (2nd wave, 2017).” (2018).