Tuesday, May 26, 2020
Current cybersecurity policy issues for the protection of...
ABSTRACT Over the past twenty years, the Internetââ¬â¢s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper willâ⬠¦show more contentâ⬠¦CURRENT END USER LIABILITIES During your part in combating cyber attacks will help policy makers address the limitations of ongoing actions against malicious traffic and determine how to implement incentives for ISPs, compan ies and software developers to report cyber attacks (Organization For Economic Co-Operation and Development, 2008). Everyone has a responsibility, end-users included. End-users range from home PCs to corporate web servers, they are the typical target of malicious traffic (OECD, 2008). As an IT Auditor, I found that end-user contributed substantially to cyber attacks, being intentionally or unintentionally. Internet policies are put in place to define the specific actions and guidelines that should be followed within the operations of the company. However, end-users rarely take heed to these polices, due to their lack of duty to security. End-users failure to take interest in the security of their systems creates negative externalities for their companies, however, they are not held liable. One of the biggest liabilities caused by end-users is the failure to attend security awareness training. This results in the end-user not being able to identify when vulnerabilities exist. For example, a user logs onto the system and a message stating that Windows updates are ready to be installed. She ignores it andShow MoreRelatedImportance of Cyber Security1744 Words à |à 7 Pagescyberspace. Itââ¬â¢s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, ââ¬Å"The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-dayRead MoreThe Department Of Homeland Security Supplies A National Protection Plan1528 Words à |à 7 PagesThe Department of Homeland Security supplies a national protection plan concerning critical infrastructure security. This plan targets a wide audience, including public and private critical infrastructure owners and administrators. Managing risks through identifying, deterring, and disrupting threats to critical infrastructure is the direct focus of this plan. The ability of an organization to reduce the impact of a threat that has occurred and reducing the impact of one that may occur is essentialRead MoreCybersecurity Essay1428 Words à |à 6 Pages US Policy Formation on Cybersecurity As the aforementioned economic sphere requires international cooperation, so does the military sphere, as cybersecurity attacks on military targets are non-geographical. This causes territorial division of responsibility to wither in importance. The US must cooperate with foreign law enforcement agencies to resolve cybersecurity concerns (Harknett Stever, 2011, p. 456). Therefore, the US cannot rely solely on domestic policy formation to address cybersecurityRead MoreThe Government Intervention And Its Effect On National Security1203 Words à |à 5 Pageseverything we do today. From the privacy of your home to the office you occupy daily or from how services such as gas and water are delivered to us. What began with the Industrial Revolution has now progressed into what is now the Digital Revolution. Cybersecurity is one of many important elements when it comes to information security and how to protect it. From the laws and regulations to who is ultimately responsible and the one to assume responsibility when breaches take place. Whether it is the governmentRead MoreImpact Of Cybercrime Today : Government And Private Industry Through Information Sharing Methods1354 Words à |à 6 Pagescybercrime today is forcing government and security agencies to place focus on cybersecurity within government, private, and public sectors. In 2015, the administration intends to pass legislation to strengthen cybersecurity across the U.S. government and private industry through information sharing methods. Contradictory controversy exists whether the government may dictate how the private industry should carry out their cybersecurity, if so, is it effective? Over the last several years, the governmentRead MoreNuclear Facilities Are Among The Most Highly Secured Infrastructure1592 Words à | à 7 Pagesthe most highly secured infrastructure in the nation. As analog system and instruments are becoming obsolete, the nuclear industry is starting to implement new digital systems throughout different facilities. In order to lower the risks of physical and cyber-attacks, nuclear facilities are adopting strict protection policy and practices. Despite the implementation of these safety measures, digital instruments and computer-based systems associated with physical protection system and control systemRead MoreThe Current State Of Our Cybersecurity Infrastructure2731 Words à |à 11 Pages In recent yearââ¬â¢s law and policy makers have expressed alarm at the exponentially growing threat of malicious traffic that has been traveling across the Internet. While most agree that something needs to be done, consensus falls apart around the issues pertaining to cybersecurity policies, laws and enforcement. This policy paper will briefly discuss the current state of our cybersecurity infrastructure. The terms of malicious traffic, liability and its forms will defined, key components will be introducedRead MoreCyber Attacks And Its Effects On The Nation s Economy1965 Words à |à 8 Pages Present day events have shown that cyber-attacks are becoming more prevalent and sophisticated on the internet especially against our nationââ¬â¢s Critical Infrastructures (CI). One of them being the U.S. electrical power grid is also a national security risk that is currently vulnerable to cyber threats from malicious actors on the intent of causing a power blackout. The lack of protection on the power grid can result in an operational nightmare that can cause other government entities or specificRead MoreCyber Security Is An Integral Aspect Of Life1859 Words à |à 8 Pagesof businesses, the general public, and the government. Presently, the internet has become an integral aspect of life: transportation, communication, entertainment, medicine, shopping, and more than is logical to mention. Cyber security involves protecting information by preventing, identifying, and reacting to attacks. As successful as cyber security has been, there have been significant issues regarding i nformation policies, and security. Disregarding the overzealous conspiracy theories and theRead MoreInformation Technology Business Model Of The Organization1435 Words à |à 6 Pages Cisco, Cloud, Data Center Transformation, Java, Microsoft, Mobility, Network Transformation, Open Source, Oracle, SAP, Security, and Smart Grid (Accenture.com, 2015). Cyber security and laws The US government has introduced a regulation for cybersecurity for all the companies in order to prevent cybercrime and protect their systems and information from cyber-attacks. Motive for majority of cyber-attacks are unauthorized access, stealing of intellectual property or confidential information and control
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.