StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The US Cyberspace - Emerging Threats - Research Paper Example

Cite this document
Summary
The present discourse elaborates emerging threats for the US cyberspace. America depends more on cyberspace. It has been the target for many terrorist groups which try to intrude into its secured databases thereby creating problems to the American government and society…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
The US Cyberspace - Emerging Threats
Read Text Preview

Extract of sample "The US Cyberspace - Emerging Threats"

Emerging Threats Cyberspace America has always been a place known for unprecedented growth and advancement. As told in every historical myth, goodness always comes along with a bad prophecy. In recent years, America has been the target for almost all terrorist groups that are trying to intrude into its secured society thereby creating problems to the American government. The development of Cyberspace has given ways to identify possible loopholes that could lead to security breach, if not sealed in advance. When compared to other countries, America depends more on cyberspace. Cyberspace allows a country to access and use its information and perform operations over the internet. This in turn improves the country’s technical aspects. Cyberspace comprises of a country’s communication networks like telephone connections, transportation systems and other electrical power machines. When considering a country like America which purely depends on cyberspace and its related technologies for both securities and growth, it is difficult for it to work without it. On a general viewpoint, it becomes mandatory for a country to secure its cyberspace from attacks. In recent times, cyberspace has become an integral part of any country’s communication system. Due to this factor, a country works more efficiently to maintain its security issues involving it. This in turn leads to developmental activities along the lines of securing the cyberspace. These activities have higher potential in deciding on a country’s growth towards becoming a developed nation. America’s infrastructure has paved way for more cybercrimes. The reason for initiating such activities to control these problems is due to the relentless developments in the communications industry. (Westby, 2004). As a result, computer generated threats and attacks are increasing day by day. So, unless an efficient strategy is followed for the cyberspace program of a country then there is every possibility of it going all awry. Cyber Security Security is considered to be the major aspect of cyberspace. Since cyber threats pose high risk to a country’s security, the country must incorporate efficient and effective tools to maintain its security. The terrorist attack on the Twin Towers created a wave of fear among the citizens as well as the government. Since then, the American government altered the way it dealt with the business and financial activities. American government realized that the design of cyber security plays a main part and it must be efficient enough to protect a country’s information. (Fischer, 2005). Cyberspace must be defended by implementing the latest security standards and technologies which offer comprehensive protection. The nations that oppose America have started targeting their systems by means of cyber threats and attacks. They aim at attacking the security system by creating threats that result in problems like system crash and data loss. This in turn affects the country’s growth and eventually leads to various other problems. The American government and private organizations work together to protect the communication systems. The nature of these attacks must be analyzed so that the executives can rectify the problem by utilizing the required software. Though the government implements critical systems, that cannot be easily attacked, there are certain features which even those critical systems lack. (Federal Bureau of Investigation, 1998). The technological development has created both negative and positive impact on these security systems. The flaws in these systems make it easy for the intruders to attack them. Cyberspace is a dynamic environment where changes take place every now and then. Hence the security system must be updated regularly to work well with these new inventions. Else it would become a tough task for the security systems to deal with various threats. The objective of a security system does not end with protecting the government and its related operations. Instead it concentrates on the entire country’s safety and security. Hence these systems must be efficient enough to handle any type of threat and attack. Unauthorized access of the data and intruding into a system has become a common task. There are people who are professionally trained to intrude into such security systems. The systems that control the government and its related activities are the most targeted ones. (Gallaher, 2008).The computer systems that store information pertaining to the defense and other governmental trades are more prone to such vulnerable attacks. Though only some of these threats and attacks make their way into the system, the after effects are unimaginable. Some of these threats enter into the system; download the passwords and other security codes from the system. Today, most of the countries rely on computer systems to maintain their information. America is one among them where computers are extensively used to operate and maintain the information of each and every transaction. Privacy of data is considered to be the aim of a network system. Details like social security number, green card information, and citizenship details are the ones to be stored and maintained in a secured manner. The government is held responsible for any loss of information regarding the citizens. (National Security Council, 2010). The major functions of a security system include data security and privacy. This can be achieved only by implementing a proper infrastructure which assures security of data irrespective of the threat’s vulnerability. The attention to new threats to U.S security does not intrude on individual civil liberties. The reason is; the systems are developed with consistent operations that concentrate on issues which create problem in the system. The infrastructure of these systems plays a major role in maintaining the information. When compared to the past, the attentions to the new threats have become a matter of concern. (McElhattan, 2009).The government must maintain the private information of the citizens in a more professional manner. This can be done only when the systems are updated according to the development in the concerned technologies. The next important factor is to employ professional people who can maintain the systems in a much efficient manner. The fulfillment of all these factors will ensure that the information system is secured. The systems that protect the civil liberties must be efficient enough to handle any sort of cyber threats and attacks. This can be achieved by proper planning, implementation and maintenance of the system. Most of these systems aim at providing security to the private data stored in the system. The modules and components installed in the system may sometimes lead to a situation where the privacy of information is lost (Crerry, 2005). The government and private organization must work together to resolve these issues which affect the civil liberties. Cyber security is one of the major problems in America and this poses a great challenge to the American nation. Recently, a research was conducted on the American government’s systems that maintain private details of the citizens. The federal government was forced to adapt new systems that would maintain their records in a more efficient manner. (Ralston, 2007). The government has decided to implement latest technologies to ensure that the systems maintain the security in an effective manner. The studies and researches conducted by various private organizations recommend that a comprehensive cyber security to be set up to make sure that the cyberspace does not receive any threats or attacks. To accomplish this, the government must implement this recommendation by conducting cyber related activities in a more consistent manner also ensuring security of data. This includes privacy options, which guarantee civil liberties and this is considered to be the main advantage of this recommendation. However, this can be achieved by introducing a new department which must be a part of the government. The aim of this department is to protect the cyberspace of U.S. (White House, 2000). The national security association Comprehensive National Cyber security Initiative (National Security Council, 2010) aimed at resolving the various issues faced by the American government. The major policies of this council include establishing a separate component to act against the latest threats. It comprises of various policies that defend against the threats; by accommodating the system according to country’s policies that define security of these systems. This department aims at providing complete security to the systems thereby ensuring that the cyberspace is inured to security. Civil liberties and privacy of data are the most important aspects and the government must make sure that they are well protected. Attention to new threats to U.S security does not intrude in civil liberties, since the new technologies and system related advancements have been implemented frequently to offer complete security to the systems. Hence the attention to new threats does not create any problem to the civil liberties. References Westby, J. (2004). International Guide to cyber Security. U.S.A: ABA Publishing. Fishcer, E. (2005). Cyber security and Homeland Security. New York: Nova Science Publishers. Gallaher, M. (2008). Cyber Security: Economic Strategies and Public Policy Alternatives. U.S.A: Edward Elgar Publishing Limited. National Security Council. (2010). Cyberspace Policy Review: Securing America’s Digital Future. U.S.A: Cosimo Inc. Crrery, A. (2005). Cyber Security for Power Systems and Networks. Industry Conference 12 303-309. Ralston, P. (2007). Cyber Security Risk Assessment For SCADA and DCS Networks. Elseiver 46.4: 583-594. White House. (2000). Defending America’s Cyberspace: National Plan for Information Systems Protection. CIAO. Retrieved from: http://www.fas.org/irp/offdocs/pdd/CIP-plan.pdf National Security Council. (2010). The Comprehensive National Cyber Security Initiative. Global Security. . Retrieved from: http://www.globalsecurity.org/security/library/policy/national/cnci_2010.htm. McElhatton, J. (2009, February 12). U.S. Intel Economy: Security Threat. The Washington Times. Federal Bureau of Investigation. (1998).Threats to U.S. National Security. Department of Justice. Retrieved from: http://www.fas.org/irp/congress/1998_hr/s980128f.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The US Cyberspace - Emerging Threats Research Paper”, n.d.)
The US Cyberspace - Emerging Threats Research Paper. Retrieved from https://studentshare.org/information-technology/1744754-emerging-threats
(The US Cyberspace - Emerging Threats Research Paper)
The US Cyberspace - Emerging Threats Research Paper. https://studentshare.org/information-technology/1744754-emerging-threats.
“The US Cyberspace - Emerging Threats Research Paper”, n.d. https://studentshare.org/information-technology/1744754-emerging-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF The US Cyberspace - Emerging Threats

Electronic Policing

Increasing security threats brought about by factors such as technological advancements and terrorism and the need to enhance public safety are the main driving forces behind governments' prioritization of security (Snow 14).... Increasing security threats brought about by factors such as technological advancements and terrorism and the need to enhance public safety are the main driving forces behind governments' prioritization of security (Snow 14).... Increasing security threats brought about by factors such as technological advancements and terrorism and the need to enhance public safety are the main driving forces behind governments' prioritization of security (Snow 14)....
2 Pages (500 words) Essay

Control of Information on the Internet

The decision to censor information is normally compelled by reasons among others; religious, normative, commerce, legal or threats to security.... However, their efforts did not succeed due to the porous nature of the cyberspace.... Name: Course: Professor: Date: Control of information on the internet Control of information on the internet refers to managing practices that governments and private organizations employ with an aim of controlling publishing of information and its access to the mass through the internet....
6 Pages (1500 words) Essay

Consequences of Attacks via Cyberspace

Fifteen years ago the economist, Stephen Polasky (1992), identified information as one of the most valuable commodities known to man.... Information, as he argued, was coveted both because of its tangible and intangible value, because of its financial and non financial rewards.... hellip; Hence, it was imperative that information owners ensure against unauthorized access to this commodity (Polasky, 1992) More recently, Sturdevant (2005) reiterated this statement but added that within the context of an e-economy and the proliferation of e-commerce and electronic data storage banks, information becoming increasingly vulnerable to unauthorized access....
5 Pages (1250 words) Essay

Ethics, Privacy, and Security Sides of Computer Spammer Issue

Global Initiatives to Secure Cyberspace: An emerging Landscape.... The author answers the questions as to computer spammer issue from the ethics, privacy and security sides.... Answering the questions, the author describes the approaches which could be taken to reduce spam and expresses his opinion as to Spamhaus methodology… The author states that there are legal issues faced in the usage and application of Spamhaus....
2 Pages (500 words) Essay

EBusiness and Ethics

Though several techniques have been developed to deal with this, emerging and re-emerging threats to computer information are still Cell Phone Projector Proposal: MIS Business Concerns Ethical concerns have been on the increase regarding information technology use.... Though several techniques have been developed to deal with this, emerging and re-emerging threats to computer information are still available.... The project will provide and set up data security to the cell phones that helps to secure the data and protect it from threats and viruses (Siegel 31)....
2 Pages (500 words) Essay

The Problem of Cyber Security in North Korea and China

hellip; Cybersecurity is an emerging global challenge that has seen some states such as North Korea and China implicated in cyber-attacks.... Cyber-attack is possible because of cyberspace, a situation where all computers globally are connected to the Internet.... cyberspace comprises of computers, mobile phones, and computer network.... State cyberspace, for example, is global cyberspace because cyberspace has no borders....
1 Pages (250 words) Assignment

Business Continuity Plan

hellip; The plan to be formulated and implemented is expected to provide White House security staff with varied possible options that would ensure that the emerging situations are adequately managed.... The primary aim of this paper “Business Continuity Plan” is to create a plan to accord the White House security staff the necessary support concerning resources, intelligence and information....
4 Pages (1000 words) Assignment

The importance of media in the evolving process

Internet and social media are excellent examples of emerging new format of social hubs which transcend geographical space and time and accelerated globalization process.... In contemporary times, the social media platform on the cyberspace has developed into the most powerful tool that wields significant influence on ideas and ideologies of people across the globe....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us