StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Future of Cyber Security - Essay Example

Cite this document
Summary
The paper "Future of Cyber Security " highlights that cyber-attack has become the most intrusive problem in life. Many small businesses and organizations are facing terrible loss and cyber threats by which the business meets with unwanted chaos…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Future of Cyber Security
Read Text Preview

Extract of sample "Future of Cyber Security"

? [Future of Cyber Security] Table of Contents Introduction 3 The outburst of Cyber Assault 3 President Obama perception on Cyber Attacks 4 The reason of cyber security ahead of security of Kinetic weaponry 6 Ways to prevent Cyber Attacks in the future 7 First Detect cyber attacks 7 By launching the highly effective antivirus 7 Coordination of federal department and agencies 7 Mobile Devices should be protected from infringement 8 Coordination of federal department and agencies 8 Conclusion 8 References 9 Future of Cyber Security Introduction Cyber security highly relies on the information and systems that could prevent from the destructive cyber threats including cyber terrorism, cyber warfare and cyber espionage. Cyber threats belligerently work in order to destroy the capabilities of any nation such as political, military and the nation’s infrastructure or the inhabitants of a nation. This is the reason government contemplates excessively by spending efforts and money to make its cyber security unyielding which averts the threats of cyber attacks. As we have seen $14 billion has been invested by the U.S federal government to empower its security sector (Amoroso & Amoroso, 2007). This research aims to answer some of the important questions that are associated with cyber security. In this scenario, this paper attempts to answer the questions such as what changes need to occur in the cyber security industry of the future and why. And is cyber security becoming more important to national security than the security of kinetic weaponry? The outburst of Cyber Assault The countries which are currently attacking United States include China and Russia. In fact, the chances of cyber security attacks have increased to a huge extent from these two nations because of their original revival in the global economy. The United States has been accusing both China and Russia of current attacks that the United States has been experiencing. The current technological advancement has greatly influenced several nations which have mainly exposed China, United States, UK and Bangladesh. It is quite expected that physical defense associated with countries particularly talking about USA will be affected which mainly with cyber terrors. Threats for controlling systems can be associated from various resources especially antagonistic governments, terrorist associations (staysafeonline.org, 2013). Additionally, for ensuring confidentiality and privacy in the informatics, it is exceedingly recommended that there should be a national level association to demeanor the in vogue studies and prepare reports on issues in the works at the crossroads of cyber attacks and privacy, society level suggested boards that would help speak to these issues from local or community perspectives. In addition, there is also a risk that even the restricted public cyber attacks that have been modeled after the ethics committees to take in hand the explicit situations concerning health data and privacy should be working in order to preserve the restrictions related to the field of cyber security. In this scenario, some of the major suggestions regarding implementation of security measures to deal with these cyber attacks include adopting the restricted, well defined, well practiced and fruitful public security requirements, including a focused assessment of security attentiveness for all public systems, and contemplation for split funding of the work compulsory to achieve ample security. It is an admitted fact that securing the rights of the people and retaining their due confidence is the responsibility taken up by the government and this has been very intensely regulated by institutions (govtrack.us, 2012). President Obama perception on Cyber Attacks A Cyber security executive orders were issued by the president of the U.S.A, Barack Obama, drew the attention by proposing policies that could defend the country from the current torment of cyber attacks and espionage working on US government agencies. The contemplative proposals culled great admiration by those who wanted to have peace in the countries and seek law and regulation. The admirable proposals are as follows: Information warfare was confirmed by the president that it is occurring in the state and its destruction scattering which is our area of concern for sustaining peace. In order to destabilize its danger, a stimulated effort will structured cyber security to the private region by which information on cyber attacks and threats would be shared and this structure will ultimately diminish the impact of Cyber threats and its causes. This Cybersecurity structure will make the government accessible to launch further private sector where the issue of cyber attacks will more efficiently be discussed secretly in order to engineer a powerful security system. Unlike the CISPA, the EO does not bring languages that will modify or direct impact privacy laws and regulations. The Cyber Intelligence Sharing Protection Act CISPA that carried languages which direct impact privacy laws and regulation but EO executive orders will not do the same. The EO puts forward precise timelines on the periodical of the Cybersecurity framework as well as an evaluation report on its connotation to privacy (Jackson, 2010). Accurate timelines were put forward by the president to make the Cybersecurity structure publicize and also a report with an evaluation that reasoning the step to privacy. Furthermore, the implementation of cybersecurity guiding principles should be ensured by at least two senior directors and suitable staff belonging to the NSC (National Security Council) and an individual Senior Director and suitable staff from the NEC (National Ethics Committee). The cybersecurity policy representative should not have working responsibility or influence, or the influence to formulate a policy unilaterally. To assist with the process of coordination, all federal departments are required to constitute a point-of-contact in their particular executive suites endorsed to contact with the White House on cyber security concerning problems (McVeigh & Rushe, 2013). The reason of cyber security ahead of security of Kinetic weaponry After the evaluation of these both modes of security many differences have occurred and make a clear distinction in terms of its capabilities and efficiencies. 1. There is a wide range of differences in these modes of security strategies. Cyber attacks which use cannons are relatively cheap and more efficient that the weapon used in kinetic weaponry such as rocket engine are extremely expensive and has now become less efficient (Shoemaker, Conklin, & Conklin, 2011 ). 2. In cybersecurity attacks, fuels are used lesser than in the security of kinetic weaponry. 3. Cyber security needs less time to complete its task than the weapons used in the kinetic method of security. 4. Nukes which are used in cybersecurity produce huge destruction by delivering a relatively small weapon whereas when we compare any kind of kinetic weapons we need lots of material in making destruction over a targeted area for the same amount of devastation (Walter Gary Sharp, 2010). 5. Cyberattacks accurately target the area it used for whereas in a kinetic mode of weapons however inaccuracy in target is probable. These are the reasons that cyber security has gained more prominence than the security of kinetic weaponry because three factors essentially play a great role in making any c\nation’s security firm that are money, time and precision of attack. Hence, cyber security leads in all and has become the first choice to any nation. Kinetic weapons are undoubtedly capable of making destruction or for certain attacks, but not as capable of huge devastation as cybersecurity (staysafeonline.org, 2013). Ways to prevent Cyber Attacks in the future First Detect cyber attacks The best way to make the threat ineffective is to detect the origin of the attack from where it is proceeding and how much destruction it consumes in order to have a compatible strategy of combat. In addition, the majority of organizations refutes this process and start devising to prevent from the threats that wasted a lot of time by which attacks easily reached the intended result. Therefore, it is important for the government or an army not to pose cyber deterrence while facing cyber threats. By launching the highly effective antivirus Despite of multiples of antivirus that are carrying out all over the world is not adequate to measure cyber attacks that are likely to scatter turbulent in the future. As we have seen there had been many cyber attacks experienced in the U.S. by Russia and China. The U.S. is the most powerful and secure state in the world having the best security system could not able to prevent itself from the chaos of it. Therefore, an antivirus must be launched in the future which would not allow the cyber attacks to trespass (Ralston, Graham, & Hieb, 2007). Coordination of federal department and agencies Cybersecurity programs can only be effective when a consistent coordination occurs among federal government and agencies, state and local government and in the international community. Mobile Devices should be protected from infringement In the case of mobile stolen or lost many useful information are probable to be leaked. It might be gone in the hand of intruder that could devise the plan for destruction out of that. Cyber attackers are also linked in these sorts of activities to abuse the information for destruction. For that reason, there should be a secured backup for the information by which only the owner of the mobile can see the details in the mobile and no one else (Graham, Olson, & Howard, 2011). Coordination of federal department and agencies Cybersecurity programs can only be effective when a consistent coordination occurs among federal government and agencies, state and local government and in the international community. Conclusion Currently, department of Homeland Security (DHS) is providing the education of cybersecurity with its effects and causes in order to get the students aware of the cyber attacks. These studies have proven essential for the students by which cyber threats would not occur upon those individual. However, this awareness is only given in a specific part of the world and thus it should become more common in every part of the world. DHS is creating a place where various students would take part in future to diminish the cyber attacks and slowly and gradually cyber attacks would become ineffective to cause destruction. This subject should be regarded as the educational field and given wide scope for its students in order to encourage more students to take part. Education is the most important aspect to compete with the calamities of life. Cyber attack has also become the most intrusive problem in life. Many small businesses and organizations are facing terrible loss and cyber threats by which the business meets with the unwanted chaos. They lack in ability to deal with the chaos and ultimately suffer. Therefore, a department should be made which purpose is to spread education to employees relating to cybersecurity. References Amoroso, E. G., & Amoroso, E. G. (2007). Cyber security. Silicon Press. govtrack.us. (2012). Cybersecurity Act of 2012. Retrieved April 22, 2013, from govtrack.us: http://www.govtrack.us/congress/bills/112/s2105/text Graham, J., Olson, R., & Howard, R. (2011). Cyber Security Essentials. CRC Press. Jackson, W. (2010). Future of cybersecurity lost in legislative limbo. Retrieved April 22, 2013, from http://gcn.com/: http://gcn.com/articles/2010/06/07/cybereye-administration-acts.aspx Lewis, J. A. (2003). Cyber security: turning national solutions into international cooperation. CSIS. McVeigh, K., & Rushe, D. (2013). House passes Cispa cybersecurity bill despite warnings from White House. Retrieved April 22, 2013, from guardian.co.uk: http://www.guardian.co.uk/technology/2013/apr/18/house-representatives-cispa-cybersecurity-white-house-warning Pfleeger, C. P., & Pfleeger, S. L. (2006). Security in Computing . NJ, USA: Prentice Hall PTR Upper Saddle River. Ralston, P., Graham, J., & Hieb, J. (2007). Cyber security risk assessment for SCADA and DCS networks. ISA Transactions , 583–594. Shoemaker, D., Conklin, W. A., & Conklin, W. A. (2011 ). Cybersecurity: The Essential Body of Knowledge. Cengage Learning. staysafeonline.org. (2013). staysafeonline.org. Retrieved April 22, 2013, from National Cyber Security Awarness: http://www.staysafeonline.org/ Theohary, C. A. (2010). Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress. DIANE Publishing. Walter Gary Sharp, S. (2010). The Past, Present, and Future of Cybersecurity. Retrieved April 22, 2013, from http://jnslp.com/: http://jnslp.com/2010/08/13/the-past-present-and-future- of-cybersecurity/ Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Future of Cybersecurity Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1474848-the-future-of-cybersecurity
(The Future of Cybersecurity Essay Example | Topics and Well Written Essays - 1750 Words)
https://studentshare.org/information-technology/1474848-the-future-of-cybersecurity.
“The Future of Cybersecurity Essay Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1474848-the-future-of-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Future of Cyber Security

Cyber Security Policy Initiatives

The present paper under the title "cyber security Policy Initiatives" concerns the policy of cyber security.... hellip; The system of technologies, procedure, and observance which are structured for protecting networks, systems, applications and important information from attacks, harm or entrance from unauthorized as well as unrecognized sources is what is known as cyber security.... With the ever evolving cyber world, cyber security is of paramount importance....
11 Pages (2750 words) Research Paper

Avoiding Cyber Threats in E-Commerce

Business organizations face millions of cyber attacks daily.... The paper "Avoiding Cyber Threats in E-Commerce" provides a deep insight into measures available to prevent cyber-attacks - intrusion detection prevention systems, firewalls, encryption, anti-virus software, and login passwords, and programs for enhancing consumers' awareness of security.... hellip; The global security technology and services were estimated to be $67.... The cybersecurity standards are prevailing security standards that enable various organizations to practice safe security techniques so as to reduce the number of successful cybersecurity attacks (Amoroso, 2012)....
6 Pages (1500 words) Essay

Cyber Security

The main objective of this paper is to analyze the concept of cyber security in association with a recent international event.... The concept of cyber security in modern world is important to understand cyber threat.... The paper seeks to answer questions related to cyber security such as: who is been harmed and by whom, what is the harm/causation, what is the broader implication of the harm and what is the major moral issue on hand.... cyber security is developed to protect the individual users as well as companies....
10 Pages (2500 words) Term Paper

Cyber Security and Business

The private sector has been opposing governments efforts to impose stricter regulation of cyber security but it is of great significance to protect the telecommunication sector and electric grid that is in the hands of the private sector.... In addition, cyber security is important to the functioning of safety essential systems like the response to an emergency and to the guard of the government's infrastructure systems.... Such a situation will leave the United States of America infrastructure exposed and vulnerable in case of cyber war with its enemies (Kirby n....
6 Pages (1500 words) Term Paper

Cyber Security as the Process of Different Security Measures

This essay analyzes that cyber security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data.... cyber security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops.... cyber security is a global concern because cyberspace is increasingly becoming a crucial asset to nations.... cyber security is a global concern because cyberspace is increasingly becoming a crucial asset to nations....
6 Pages (1500 words) Essay

Cybersecurity Issues - the Silent Attack on Organizations and Consumers

Whether the payment is made now r later, it is apparent that there exists a variety of long-term challenges associated with the future of cybersecurity.... As a result of a variety of security risks, cybersecurity tries to ensure the attainment as well as maintenance of overall security properties for both the organization and the users.... The higher the intake of technological developments, the higher the risks of cybersecurity that impact not only the economic sector but also the security sector among others....
10 Pages (2500 words) Essay

Role of Computer and Information Security in Defining Current National Security Issues

"Role of Computer and Information security in Defining Current National security Issues" paper states that the use of computers and information availability has highly resulted in many national insecurity issues in many countries, hence affecting most of these countries economically and socially.... nbsp;… The global advancement of internet and computer-networking development as well as information availability plays a vital role in defining the current national security issues....
8 Pages (2000 words) Coursework

Cyber Security, Network and Computer Systems Administrators, and Computer Programmer

"cyber security, Network and Computer Systems Administrators, and Computer Programmer" paper contain an annotated bibliography that reviews five sources for the following three occupations: cyber security, Network and Computer Systems Administrators, and Computer Programmer.... Computer system organizations are expected to develop and grow rapidly as the amounts of cyber-security attacks increase and innovation as well as technology advances....
3 Pages (750 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us