Cybersecurity

Read Complete Research Material



Cybersecurity

Cybersecurity

Introduction

This paper contains the detailed analysis of cyber security and the threats posed by it. Cyber security is the most severe aspect of a nation in terms of the privacy and security of its civilians and nation. The paper also discusses the weaknesses of cyber system, its policies at workplace and the ethical dilemmas associated with it.

Cybersecurity Weaknesses and Recommendations

The article of Theohary & Rollins focuses the cyber security concerns in terms of its threats toward the civil and national security and defence. The article discusses current weaknesses of cyber security system within the state with possible policy implications. Mainly Cyber-security intends to defend the protection of the nation in terms of its networks, content and processes. It also enables the system to defend the purpose in cyberspace. However, the most significant aspect is the security concerns of homeland.

DHS (Department of Homeland Security) lacks in this regard as most of the processes and technology of cyberspace is controlled by private sectors, which limits the government access or control on cybersecurity activities (Theohary & Rollins, 2009). Although private sectors are greatly involved in cyber security concerns, yet it can get better by implementing Cyber Intelligence Sharing and Protection Act (CISPA) irrespective of its controversial nature. It limits the people to access the confidential data by the unauthorized people. Moreover, impairment or manipulation to the integrity form the information system will also be eliminated (Gothard, 2012).

Cyber-security also lags behind in its intended purpose as the technological advancements are not considered in the department of cybersecurity. People do not implement the comprehensive strategies for meeting the demands of security based on the nature of threats. Increased sense of threats demands advanced technological implementation, which is not considered in the field of cyber security (Theohary & Rollins, 2009). This issue requires the implication of Integrated Security System (ISS) for minimizing the cyber crimes. Government agencies should make it possible by keeping the entire system updated in terms of technologies as advanced nature of technology leaves all the previous methods obsolete by bringing in newer technologies (Julie, 2010).

Cyber-security also faces difficulty in protecting the individuals' privacies and the civil liberties in terms of information and network security. The free nature of internet technology and its free availability to all the people creates severe concerns of security and its tradeoffs (Theohary & Rollins, 2009). The Digital Millennium Copyright Act and the Computer Fraud and Abuse Act are applicable in this regard. These laws will support the secured nature of cyber issues.

Challenge of Attribution to Cyber Security Policies

Attribution is no doubt a severe issue to the policy makers of cyber security. Security measures are easy to implement or deploy if the reasons or the responsible persons are identified easily and appropriately. It is not enough to detect the issues faced by the cyber system unless the reason behind is evident. The policy makers of United States of America face the same conflicted situation, pertaining to the continuous attacks on their cyber system, but no known or ...
Related Ads
  • Government Cyber Security...
    www.researchomatic.com...

    Free research that covers how can government justify ...

  • Cyber Security
    www.researchomatic.com...

    Cyber Security Introduction With the emergenc ...

  • Cyber Security
    www.researchomatic.com...

    Cyber Security Introduction Organizations tod ...

  • Cyber Security
    www.researchomatic.com...

    Cyber Security Introduction Internet, by far ...

  • Cyber Security
    www.researchomatic.com...

    Cyber Security Abstract With the emergence of ...