StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Protection of the Cyberspace in Small and Medium Enterprise Systems - Assignment Example

Cite this document
Summary
The paper "Protection of the Cyberspace in Small and Medium Enterprise Systems" focuses on the competitor’s presence. Competitors will help the designers to know how well to design the product to ensure it is accepted in the market and that the competitors will not take full control of the market…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Protection of the Cyberspace in Small and Medium Enterprise Systems
Read Text Preview

Extract of sample "Protection of the Cyberspace in Small and Medium Enterprise Systems"

? Recommendations to the “Cyber Czar” Recommendations to the "Cyber Czar" Introduction The most important infrastructure related issues are incorporated in private and public institutions. These sectors include public health, water and agriculture. These are some of the aspects that control the systems of a country. The cyber space comprises of thousands of networks connected through computers, switches, routers servers and the fiber optic cables. This allows for critical infrastructure to employ. If a cyber space functions well, security in an economy is enhanced greatly (Brakel & Hert, 2009). Countries work with special strategies to facilitate cyberspace security. This is aimed at protecting a national territory from cyber space malicious attacks. Implementing the security system is a joint comparison of Homeland Security and the National Strategy. The policies are set to engage the global population to engage in implementing security levels in the cyberspace. This comes as an initiative of every country to implement security details in the cyberspace they own, operate and control. Securing the cyberspace involves difficult strategic challenges which require focus and coordination from the entire society. This comes as a combined force from the local and state governments and the private sector (Arias, 2010). Objectives set to meet the recommendations The strategy to secure the cyberspace comes with a combination of prioritizing and organizing efforts. This offers departmental heads in government with directions in curbing malicious attacks on the cyberspace. The strategy aims at identifying the local and state governments, private organization and individuals who can take place in improving cyber security. The highlight of the strategy is in the merging of private and public engagement. Improving cyber security comes with everyone working as one to secure the cyberspace. Understanding the dynamics of the cyberspace requires adjustments and amendments with time as cyberspace security changes with time. Cyber-attacks occur on a basis of anonymity and speed making it necessary to protect individuals from criminals. The security issues occur only after the threat occurs hence the overall strategy in securing crimes related to cyber helps in the reduction of cyber space attack vulnerability. Consistence within the National Strategy by the Homeland Security works with set objectives to ensure that the set strategy in securing cybercrime works with the set recommendations (Briggs & Burke, 2009). The main objectives are to: 1. Provide the citizens with security from cyber-attacks on critical infrastructures 2. Reduce the possibility of individuals to get cyber attacks 3. Implement a damage control and recovery plan from the cyber attacks The threat and vulnerability portrayed by the cyberspace The economy and the security system depend on information technology. Major applications that run at the core depend on the internet. The internet was originally built to facilitate research among scientists. Abusing the internet network was not part of the plan. Today the internet connects people through computer networks exposing ISP’s, Software Manufacturers, End Users and Operating System producers to malicious attacks. Computer networks connect different objects such as stock markets, electrical transformers and trains. A malicious attack that compromises the functioning of such objects puts the end user at a disadvantage. Cyber Czar can spread a spectrum of malicious attacks against critical information. The main concern is organized attacks that cause disruption of the National critical infrastructure, national security and the economy. Attackers require sophistication to carry out such attacks but this does not mean that countries can relax on setting security measures. Nations face situations where hackers have identified loopholes where they can maximize on in doing their fraudulent activities (Purdy, 2011). Proper analysis of the cyber threats needs a long term analysis of the threats and vulnerabilities. Many hackers share their intelligence in some sites, and this make available methods and tools for attack online. In Internet Service Providers (ISPs) find it difficult to monitor the controls of individuals. This puts the government, universities, private companies and research centers at the risk of losing confidential information. The cyber space puts countries at the vulnerability of facing cyber strikes during war. This works by providing them with easy access to identification of targets, lace infrastructure and provide shortcuts for school going children. The United States networks have experienced serious consequences faced by cyber-attacks. Software manufacturers have experienced piracy of their information, causing them loss in revenue and intellectual property. The organizations have to come up with counter attacks to prevent robust capabilities that do not exist. Organizations cannot completely eliminate the threats, but reduce the vulnerability and deter the attackers from causing harm (EcommerceJournal, 2010). Recommendations to the “cyber czar” The sector privately run remains well facilitated with infrastructure to counter cyber crime. Cyber czar however best runs if controlled by the federal government. In the event of a cyber-threat, the public is likely to suffer most as compared to the private sector. On an external platform, the government’s role in cyber security comes in times of high transactions and legal barriers. The government prepares a significant recommendation list in an attempt to resolve incentive problems. The recommended platforms vary in methods of application (Brakel & Hert, 2009). Merging of the private and public sector As per the government recommendation, private and public institutions should work together in creating a safe cyberspace for all. This works better because public-private mergers can end coordination problems. Information exchange and cooperation among the two take various forms where they address remediation, recovery operations, technological improvements training and awareness. The federal role applies in some cases aimed at providing intervention. This is aimed at overweighing the associated costs. This is a standardized measure in terms of the private sector solving addressed solutions. Consideration in each case comes with broad-based costs and the impacts of the government actions. It is important to analyze the actions and other alternatives in comparison to the non-actions that take into recommendations of the future private solutions. Federal courts call for security in the cyberspace for the purpose of ensuring forensics; network protection, warnings, and attack attribution remain protected against organized attacks. Federal courts call for activities in support of research and technology to aid in development enabling a better private sector. This enables a portion of infrastructure which is privately owned (Thomas, 2008). Supporting Homeland Security work The importance of the cyberspace security intelligence is well known in the United States when President Bush signed legislation on November 25, 2002. The signing created the department of Homeland Security (DHS) which works to unite 22 federal parties to find improve homeland security. DHS is faced with the responsibility of protecting the cyberspace. As individuals, a public and private organization, DHS is responsible for developing a detailed plan that will deal with ensuring a comprehensive plan for the nation. This is important in securing key resources in the critical infrastructure in the United States (Slevin, 2000). The department ensures the provision of a crisis management plan to respond to attack on information systems. The departments ensure that individuals gain practical assistance in government entities and private sector. The plan works for an emergency plan that recovers information. Coordination comes as an easy task for enabling the federal government works with specific information warning about the appropriate protective measures. The countermeasures ensure that the local, state, academic, private and nongovernmental organizations benefit. The department ensures a well maintained funding research and analysis that comes with implementing agencies that deal with specific information. This helps in implementing new technology that can aid in protecting the homeland security. In addition to the responsibilities of DHS, the department becomes a center of federal excellence in terms of cyber security as it is the focal point meant to meet the needs of the local, state and nongovernmental societies. Facilitating cyber security in organizations Cyber security comes with ensuring the problems in the organizations. Recommendations come with solving the main aspects of the organization. The problems experienced by organizations are different planning and change audit analysis is the main problems in organizations. The fact that the company wishes to adapt to a new management system becomes enticing since it has to go through various steps to ensure that it is done. Any project which tries to offer management security is very difficult to initiate, mostly for big companies. Various measures are scrutinized to make sure that on the onset of the system; delays brought about by improper usage are eliminated. In terms of budgeting, proper analysis should be made to ensure that the company is in a position to finance the process (Purdy, 2011). Analysis the courses of cyberspace security In connection to the organizations, the rule of how the framework will work continues as before. However, chances are that the new security administration framework could be more favorable for the association. Tapping structures frameworks and techniques could be finished by the click of a catch. Assuming that a client requests for an aid on the web, every bit of the related individual that need qualified data will be given quickly. Case in point, if an examination of every last trace of the requested items needs to be made, the administration does not need to hold up for every last one of the deals agents to touch base with their reports with the intention that they are made. It might be finished promptly. Security levels are increased as different administration levels were installed (Purdy, 2011). Security management at the organization level The security management system presently in use by organizations is reliable, but slow when there is an influx of orders on demand. Implementing a new system for managing security or redesigning the current system will ensure that proper handling of the process is easy. On looking at the Organizations, they deal with offering products and services to their customers who have to order. The company has employed sales representatives that have to manually ordered services for their customers, the company has a new idea of implementing a system and the company wishes to adapt. The problem at this point is that the company is currently finding it difficult to run their business online. The people who would need this system include; the administrators, the customers shareholders, market, and financial analysts of the company. This should be done to find out if implementing the security management system will be that beneficial to the company. This analysis should be done by asking all the people who work or interact with the company to ensure that all opinions are incorporated. After confirmation that the Security Management system will be highly beneficial to the company, it is noteworthy that the company sets a date for when the system should be implemented. Setting the date will require the management of Organizations to plan toward ensuring that their problem is solved. On looking at the system, it important that an analysis is made on the where implementation will take place, and how many access points should be set for the operation of the system. This will be done on the assumption since; the company is working on this for the first time (Briggs & Burke, 2009). Priorities to consider while implementing the recommendations for cyber security Implementing the recommendations to the cyber czar comes with setting priorities. The national strategy to secure the internet comes with ensuring the priority setting for five aspects. The priorities include; Ensuring that the response system has an efficient cyberspace related security Ensuring an efficient and extensive security response in terms of the vulnerability reduction program Create an awareness program that trains individuals on the concepts Secure the cyberspace of the governments Create a link of national security and cyberspace security cooperation Conclusion Protection of the cyber space entails protection of the small and medium enterprise systems. While working to ensure communication between the public and private business sectors, the small and medium enterprises Small and Medium Enterprises may not require such complicated frameworks to work properly. Competitor’s presence is one of the most important aspects to put into consideration when developing a new product; the organizations product is being produced in, the consumers of the product in mind as well as the distributors of the product and those who will supply it. This is because these factors will ensure the success of the whole product development process. Competitors will help the designers to know how well to design the product to ensure it is accepted in the market and that the competitors will not take full control of the market by selling more than them. The prospective Organizations will matter in that it will determine whether the project will run or not because the process has to be discussed by the whole staff. The product in question has to be put under scrutiny because it will matter a lot how the consumer will embrace it. Consumers have to be put in the picture because they are the ones who will test the product, and determine how well it runs in the market by their response in buying and using it. It will be critical to carry out a new product idea evaluation stage by stage in the course of the product development to ensure that nothing goes wrong. This will also ensure that the product sells, and the Organizations become successful. Marketers will best promote consumer adoption of the new product by direct sales and listening to consumer’s comments as well as ideas (Brakel & Hert, 2009). References Arias, M. L. (2010, September 16). Internet Law - Personal Jurisdiction and Interactive v. Passive Websites. Retrieved November 25, 2011, from IBLS: http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=2370 Brakel, R. V., & Hert, P. D. (2009). Policing Surveillance and Law in a pre-crime society: Understanding the consequences of technology based strategies. Retrieved from http://www.vub.ac.be/LSTS/pub/Dehert/378.pdf Briggs, A., & Burke, P. (2009). Social History of the Media: From Gutenberg to the Internet. London: Polity. EcommerceJournal. (2010, September 10). Internet and e-commerce industry in Suriname. Retrieved October 29, 2011, from Ecommerce Journal: http://ecommerce-journal.com/category/tags/suriname. Purdy, R. (2011). The Internet, Boon or Detriment to Society? Retrieved November 21, 2011, from http://iml.jou.ufl.edu/projects/students/purdy/index.htm. Slevin, J. (2000). The internet and society. Hoboken: Wiley-Blackwell. Thomas, E. G. (2008). Internet Marketing In The International Arena: A Cross-Cultural Comparison. International Journal Of Business Strategy, 84-98. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Recommendations to the Cyber Czar Assignment Example | Topics and Well Written Essays - 2250 words”, n.d.)
Recommendations to the Cyber Czar Assignment Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/information-technology/1467595-recommendations-to-the-cyber-czar
(Recommendations to the Cyber Czar Assignment Example | Topics and Well Written Essays - 2250 Words)
Recommendations to the Cyber Czar Assignment Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1467595-recommendations-to-the-cyber-czar.
“Recommendations to the Cyber Czar Assignment Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/information-technology/1467595-recommendations-to-the-cyber-czar.
  • Cited: 0 times

CHECK THESE SAMPLES OF Protection of the Cyberspace in Small and Medium Enterprise Systems

E-Business Is Better If Localized

Murphy (1998) describes "a new business model or paradigm that he calls alternatively" an "internetworked (virtual) enterprise" or "extended enterprise.... Computer-driven technologies are making it possible to turn out small runs of increasingly customized goods aimed at niche markets....
10 Pages (2500 words) Essay

The Internet: Application in Marketing

Nowadays, large transnational businesses, major domestic enterprises, and increasing numbers of small companies highlight the development of electronic business and transactions opportunities as their key priority (Chaffey et al.... This paper provides an overview of the advantages and challenges involved in electronic commerce that represents an attempt to understand the range of issues related to using the Internet for business....
8 Pages (2000 words) Research Paper

Cyber Security Industry

For the hackers, it has become very easy to break through into… rs computers and information systems and get access to the confidential and private information that can come under utilization in the negative manner as well. In order to make the information system of the corporation securer and safer, the company by the name of ABC is initiating its business that can provide the customers with a safer IT working environment.... Primary products and services offered by ABC Corporation to its clients include cyber security assessments, vulnerability analysis, cyber security audits, cyber security training, secure broadband network communications, cyber intelligence systems, software and analytics to address cyberspace threats, and other capabilities that enable the customers to detect, evaluate and respond to cyber threats (Gallaher, Link & Rowe, pp....
14 Pages (3500 words) Research Paper

Driving Change Through Diversity and Globalization

In addition to the internet and the cyberspace, there  has also been the existence of the global media networks that have... Globalization refers to the process of international linkages and integration brought about by the interchange of word products, views, ideas and even cultures....
12 Pages (3000 words) Research Paper

The Internet Technology to Traditional Business

This work called "E-Commerce" describes some workable solutions tackle such inhibitors.... The author takes into account barriers to e-commerce in the UK and the whole world, some business aspects, the role of the internet.... hellip; The purpose of this paper is to show how internet technology has dramatically altered the way business operations and how significant e-commerce is for the UK economy and the major inhibitors which may affect the penetration of e-Commerce....
14 Pages (3500 words) Coursework

Entrepreneurship and New Enterprise Creation

The paper "Entrepreneurship and New enterprise Creation" states that a society becomes prosperous to the extent that it rewards and encourages entrepreneurial activity.... Few of us have the satisfaction of running our own business enterprise or marketing our own services or products.... The vast majority of humankind chooses to work for a business enterprise or an entrepreneur who pays them a weekly, fortnightly or monthly remuneration for rendering their services in his business enterprise....
20 Pages (5000 words) Essay

Postal and Shipping Sector of the Homeland Security

Its specific assets comprise of tens of thousands of domestic delivery units; lots of and diverse collection, approval and retail businesses; high-volume programmed processing amenities; information/communications systems; and mail transfer pieces of equipment.... Yet another policy that guides the sector is the need to ensure the implementation of protective schemes and programs such as physical susceptibility mitigation measures including cyberspace security assessment, workers security measures, and the handling of hazardous materials....
7 Pages (1750 words) Assignment

SWOT Analysis of Internet Security

Opportunistic individuals have taken advantage of the flaws to carry out unethical behavior such as hacking and by-passing systems to carry out cyber-crimes.... o remedy these unethical behaviors, there have to be ways of controlling systems in communications technology.... Caution should be taken so as to avert the huge losses that may arise from such penetration into communication systems by intruders, some of whom do it just out of sheer malice....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us