StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Considerations in Cybersecurity - Coursework Example

Cite this document
Summary
The paper "Considerations in Cybersecurity" focuses on the critical analysis of the major issues in the considerations in cybersecurity. There are several considerations when comparing and contrasting the impact of cybercrime on businesses against traditional crime…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Considerations in Cybersecurity
Read Text Preview

Extract of sample "Considerations in Cybersecurity"

Bharra (2012) interviewed four major organizations and discovered that they were not even aware of which branch of the Federal Bureau of Investigation (FBI) should inform in case of a cyber-attack. There is the further consideration that while many businesses actively have security measures in place for traditional crimes, the relative ignorance of cyber crimes has created a more lax environment. Indeed, a recent report by Verizon indicated that close to 90% of cyber-attacks in the last year could have been avoided if the businesses had taken proper preventative precautions. The punishment for committing cybercrime is already significant. In this way, one considers that illegally accessing a network can result in between 5 months to 5 years of imprisonment ("Real cost of", 2011). In other instances, it seems that cybercrime is not taken as seriously as traditional crime. One considers that Jeffrey Lee Parson created an Internet virus that caused significant damage to countless. However, Parson’s punishment was extremely lenient; in this way, he received a sentence that was less than many people receive for a marijuana offense (Mccullagh, 2011). Of course, punishment for cybercrime is relative to the specific offense and legal environment. Still, it seems that there may be a degree of leniency involved. Ultimately, it’s clear that the American legal system must increasingly take into account the impact the cybercrime, rather than the fact that it occurs behind a computer desk when assigning legal punishment.

Adagia Telecom. The United States government has established several compliance measures aimed at preventing or reducing cyber-attacks ("Cybersecurity assurance program," 2012). In this way, Adagia Telecom had relatively lax cybersecurity measures in place. One prominent area that Adagia did not have in place was proper control over automated telecommunications processes. While this factor is generally a major element in oil and gas and manufacturing industries, it’s clear that it is equally important for Adagia Telecom; the lack of adequate compliance in this region greatly contributed to the organization’s cyber vulnerability, as malware was able to infect these automated systems (Heiman, 2012). One of the greatest challenges with private industry is an unwillingness to disclose cyber-attacks, as it could impact business strategy. Adagia must report the attack to law enforcement. In this way, one considers that there must be a culture of disclosure that is established which can act as a deterrent against future criminals. Of course, there is always the challenge of locating necessary evidence in such cyber cases, as oftentimes the perpetrators can erase the traces of their entrance into the network.

level to get a policy that directly targets cybercrime. Similar to much policy implementation, the primary challenge is divergent perspectives between the major political parties. Indeed, the Republican and Democratic parties have already established conflicting approaches to cybersecurity in their current Presidential platforms. Corrin (2012) indicates that there are significant differences in perspective, as the Republicans criticize the Democrats for overly relying on defense capabilities in their approach to cyber security efforts. Another major challenge related to cyber-security is the nation’s attack measures. One considers that the current government infrastructure is such that the President is the only one able to authorize a cyber-attack (Sanger, 2012). In this way, the United States may not have enough legislative options available to address cyber-security.

To a large extent, it seems clear that the public demands adequate cyber security measures. In many instances, cyber security has already become integral to daily life, as anti-virus software is essentially a requirement for all computer systems. Additionally, most members of the public have come to expect that their participation in electronic commerce occurs under secure networks. Still, it is possible that in higher-level or more complex situations, the public remains ignorant of the threats. National security is one such area where the public potentially remains ignorant of the dangers of cyber-attacks. Schmitt (2012) considers that between 2009 and 2011 there was a 17-fold increase in cyber-attacks on United States national security. To a large extent, it seems that the United States public’s concern has not kept pace with these significant increases. Ultimately, I believe legislative efforts need to develop a more comprehensive plan of action for addressing cybercrime.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1456814-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1456814-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1456814-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Considerations in Cybersecurity

Cybersecurity Threats and the Future of the Internet

The paper "cybersecurity Threats and the Future of the Internet" discusses that cloud computing is subject to an equal amount of external threats like any other modern-day technologies and interfaces.... Concept of Cyber Security: The term cybersecurity pertains to enacting actions that are necessary to be taken into account for safe and better services and operations in this medium....
17 Pages (4250 words) Coursework

Cyber Attacks on America

Therefore, America is increasingly vulnerable to cyber-attacks which grow by breadth and complexity, indicating the need for the country to continuously adapt and re-engineer its protection approaches that would uphold its cybersecurity.... The review "Cyber Attacks on America" observes America's vulnerability to cyber-attacks has increased leading to loss of confidentiality, integrity, and availability....
10 Pages (2500 words) Literature review

Cyber Security Policy Initiatives

The present paper under the title "Cyber Security Policy Initiatives" concerns the policy of cyber security.... It is mentioned that a number of measures can be taken to help protect information and systems from cyber attacks.... ... ... ... The system of technologies, procedure, and observance which are structured for protecting networks, systems, applications and important information from attacks, harm or entrance from unauthorized as well as unrecognized sources is what is known as Cyber security....
11 Pages (2750 words) Research Paper

Information Systems Security Survey

RS has delegated the responsibility of the development and maintenance of an information security system to cybersecurity.... The main responsibility of cybersecurity is to identify and monitor any cybersecurity threats and putting up strategies to combat any breach of security affecting IRS.... cybersecurity's main duty is to prevent any incidents of insecurity with IRS's information security system....
3 Pages (750 words) Essay

Cyber Security Job Vacancies

cybersecurity job vacancies are quite difficult to fill, as there are more than one million unfilled positions in the world, according to 2014 statistics.... The paper "Cyber Security Job Vacancies" highlights that a diverse work group will employ all their skills and defend cyberspace....
4 Pages (1000 words) Research Paper

Cybersecurity Issues - the Silent Attack on Organizations and Consumers

The paper "cybersecurity Issues - the Silent Attack on Organizations and Consumers" describes that cybersecurity measures will result in preventive mechanisms as well as engaging in real-time intelligence as well as threat assessments to capture pre-emerging threats.... As a result of a variety of security risks, cybersecurity tries to ensure the attainment as well as maintenance of overall security properties for both the organization and the users....
10 Pages (2500 words) Essay

Critical Annotated Bibliography on Cybersecurity

The author of this paper "Critical Annotated Bibliography on cybersecurity" discusses the literature concerning the problems of cybersecurity, criminal and fraudulent motivations, the security implications in information communication, critically analyzing the bibliography.... In the context of cybersecurity, the government of the US has focused on the seven crucial areas including risk management, incident management, privacy and information sharing, international engagement, supply chain security, research and development, innovation, education, and awareness....
6 Pages (1500 words) Annotated Bibliography

Effect of Decision Making in Cybersecurity

The paper "Effect of Decision Making in cybersecurity" describes that decisions adopted in any organization have a huge impact.... With these factors put into perspective, it remains essential to explore the effect of human decision-making in cybersecurity.... In the case of cybersecurity, the decision taken about the system and software to be used in the organization determines how secure or vulnerable it becomes.... Decisions of having the best systems and software strengthen cybersecurity and lower the chances of intruders....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us