Tuesday, September 24, 2019

Recommendations to the Cyber Czar Assignment Example | Topics and Well Written Essays - 2250 words

Recommendations to the Cyber Czar - Assignment Example Countries work with special strategies to facilitate cyberspace security. This is aimed at protecting a national territory from cyber space malicious attacks. Implementing the security system is a joint comparison of Homeland Security and the National Strategy. The policies are set to engage the global population to engage in implementing security levels in the cyberspace. This comes as an initiative of every country to implement security details in the cyberspace they own, operate and control. Securing the cyberspace involves difficult strategic challenges which require focus and coordination from the entire society. This comes as a combined force from the local and state governments and the private sector (Arias, 2010). Objectives set to meet the recommendations The strategy to secure the cyberspace comes with a combination of prioritizing and organizing efforts. This offers departmental heads in government with directions in curbing malicious attacks on the cyberspace. The strateg y aims at identifying the local and state governments, private organization and individuals who can take place in improving cyber security. The highlight of the strategy is in the merging of private and public engagement. Improving cyber security comes with everyone working as one to secure the cyberspace. ... Consistence within the National Strategy by the Homeland Security works with set objectives to ensure that the set strategy in securing cybercrime works with the set recommendations (Briggs & Burke, 2009). The main objectives are to: 1. Provide the citizens with security from cyber-attacks on critical infrastructures 2. Reduce the possibility of individuals to get cyber attacks 3. Implement a damage control and recovery plan from the cyber attacks The threat and vulnerability portrayed by the cyberspace The economy and the security system depend on information technology. Major applications that run at the core depend on the internet. The internet was originally built to facilitate research among scientists. Abusing the internet network was not part of the plan. Today the internet connects people through computer networks exposing ISP’s, Software Manufacturers, End Users and Operating System producers to malicious attacks. Computer networks connect different objects such as st ock markets, electrical transformers and trains. A malicious attack that compromises the functioning of such objects puts the end user at a disadvantage. Cyber Czar can spread a spectrum of malicious attacks against critical information. The main concern is organized attacks that cause disruption of the National critical infrastructure, national security and the economy. Attackers require sophistication to carry out such attacks but this does not mean that countries can relax on setting security measures. Nations face situations where hackers have identified loopholes where they can maximize on in doing their fraudulent activities (Purdy, 2011). Proper analysis of the cyber threats needs a long term analysis of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.