Cyber Security

Read Complete Research Material



Cyber Security

Cyber Security

Summary

In this reported we have analyzed the current situation of the U.S Cyber security. We have mentioned in this report some of the bigger challenges faced by the Cyber security Policy makers. We have mentioned key legislations for Cyber security. The implementation of the main Cyber security bills and their successfulness for preventing the cyber attacks and we have also mentioned those areas where these regulations fail to provide Cyber security and what changes are needed to be made in these policies by the policy makers. We have provided examples of how cyber attacks are threatening the U.S businesses and the national individualities.

Key Findings to Cyber Security in Software and Hardware Compliance Industry

Four Major Challenges for Cyber Security Policy Makers

These challenges have evolved with the growing reach of the network of communication and globalization. The volatile growth of the Internet during the last decade has created enormous opportunities for U.S. to enhance its strategic status across the globe: the Internet has improved almost every part of American power. The advent of social networking and advanced tools for fundraising has accelerated the growth in dynamic organizations that are working to promote the common good. In short, protection of critical resources in cyberspace is the fundamental national concern.

The challenge of the improvement of U.S. cyber defense is so difficult and multifaceted. The minds of senior state security naturally drift towards the most interesting issues in relation to the offense, such as victimization and policy of first use. In the future, it pays to think of innovative ways that the U.S1. can develop policies that enhance our cyber defense. Whereas, the "active defense" is an essential element of cyber security.

Challenge One: Need of Finding Technological Solutions

The original technology rules that control the Internet termed as Internet Protocol were planned without considering the security. These rules successfully promoted growth and widespread adoption of the Internet, but several features of this open planning complicate the formulation of national security policies. In addition, the software industry in the United States has developed all the exceptional sauce that enables the Internet to efficiently meet our needs, but the malicious softwares (also termed as malware) have plagued our systems. There are four main features of cyberspace that help to describe this phenomenon, which deserves extra attention when it comes to policy for cyber security: the first is simply speed. Within cyberspace, the rate of attack is measured in milliseconds, not in minutes1. Networks and systems can be attacked any time from any network, sometimes with little warning indication any more often without any indication.

This complicates various security aspects, as the strategic thinking is based on this theory that a state has the power to detect an imminent attack. Besides the difficulty of the problem is the assignment of the resilience of the software. At primary level, the origins for most cyber attacks are vulnerabilities because of errors in the code of software. A generally accepted estimate among the technological group is that for every code of one ...
Related Ads