Premium Essay

Cybersecurity Policy Issues

In:

Submitted By LTWITHER
Words 1930
Pages 8
ABSTRACT

Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users. INTRODUCTION

From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the

Similar Documents

Premium Essay

No File

...Week 9 Assignment 3: Cybersecurity The National Initiative for Cyber Security Education Initiative. Released in 2009, the Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure acknowledged the need for cybersecurity public awareness and an advanced cybersecurity workforce. To address these needs, the Comprehensive National Cybersecurity Initiative (CNCI) developed 11 initiatives to help secure the United States in cyberspace. The National Initiative for Cybersecurity Education (NICE) was established to lead the work on the goals outlined in Initiative 8, which addresses the Nation’s cybersecurity needs related to public awareness, education, professional development, and talent management. (McDuffie, 2009) In the past 20 years, the innovative use of cyberspace has transformed the day-to-day operations of the Nation. These advances have enhanced the lives of individuals, business, and government in profound ways. From eCommerce, to mobile communications and complex networked systems, the rapidly growing dependence on cyberspace is evident. In the years to come, the Nation’s dependence on cyberspace will only increase as technology advances and will further integrate into our daily lives. Great advances in technology comes with great risks. The Cyberspace Policy Review identified vulnerabilities in cybersecurity as systemic risks introduced into infrastructure, defense, and personal property due to the widespread adoption...

Words: 1570 - Pages: 7

Free Essay

Cybersecurity and Cyberwar

...(Book Report) December 11, 2015 Cybersecurity and Cyberwar: What the world needs to know After everything that has been happening in the world, from the 9/11 takedown of the twin towers, to the shooting in Paris almost a month ago, the world has been drawn to attention to the extent of surveillance and cyber-espionage practiced by the US government, not only in relation to suspected terrorists but also in relation to the ordinary citizen. After reading Cybersecurity and Cyberwar, I feel like it comes at an interesting time in the history of security services world-wide, when the extent of inter-connectivity of every agency, corporation and individual makes cyber-surveillance easier to put into effect. The authors are experts in their field: Peter Singer is Senior Fellow and Director of the Center for 21st Century Security and Intelligence at the Brookings Institution, a former coordinator of Obama's defence policy task-force during the 2008 campaign and author of three other books on aspects of warfare. Allan Friedman is also a well-known expert in the field of information security and cyber-security, formerly Research Director for the Center for Technology Innovation at the Brookings Institution, and currently Visiting Scholar at George Washington University's Cyber Security Policy Research Institute. In other words, this is an authoritative text. In Cybersecurity and Cyberwar, Singer and Friedman attempt to fill this worrisome knowledge...

Words: 1488 - Pages: 6

Premium Essay

Apple Inc 2008

...URE , SAFE T Y, AN D E N VIRON ME N T PROGRAM Cybersecurity Economic Issues Corporate Approaches and Challenges to Decisionmaking RAND RESEARCH AREAS THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE C ybersecurity economics is an emerging field. There is a significant need for better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. In two articles, RAND senior scientist Shari Lawrence Pfleeger and her colleagues addressed these key cybersecurity concerns and identified how different types of companies or organizations perceive the importance of cybersecurity and make cybersecurity investment decisions. Abstract The emerging field of cybersecurity economics could benefit from better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity investment decisions. In particular, it suggests...

Words: 2167 - Pages: 9

Premium Essay

Cybercrime Law, Regulation, Effects on Innovation

...on Innovation Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology CSEC 620 9024 Summer Semester May 18, 2015 Table of Contents Introduction 1 The Role of the Government in Protecting National Security 1 Acceptance of Government Intervention on Protecting National Security 2 Reaction to the Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies and procedures for private sectors...

Words: 1899 - Pages: 8

Premium Essay

Csec 610

... -Al Gore What is Vulnerability? When you think of the word vulnerability what comes to mind? Although, definitions of Vulnerability may vary, Vacca (2013) defines the term as “an asset or a group of assets that can be exploited by one or more threats”. In the cyberworld vulnerability can be described as a weakness in a computer hardware or software, which could possibly become exploited. Most would consider vulnerability, as a threat as the approach in which vulnerability can be exploited through a potential cause of an incident. Today, processes and technology alone can’t assure a secure organizational atmosphere. To compromise a satisfactorily secure organization, cybersecurity policies and procedures are inaugurated and expertise within an organization could conceivably be acerbic the edge. Vulnerabilities in the cyberworld are growing constantly as companies and organizations are vastly turning over to computers. Today managers face more and more vulnerabilities in an...

Words: 2316 - Pages: 10

Premium Essay

It Professionalization

...Daniel Sweeten 9/24/14 Wednesday Night Would Cybersecurity Professionalization Help Address the Cybersecurity Crisis? Professionalization over cybersecurity is an issue that has been debated by professionals and governments ever since cyber-attacks started to become a threat to the security of nations, governments and business alike. However some of the issues are that the field moves too fluid for a set of standards to be put in place to govern the field as a whole, and that in a realistic real world approach that is not feasible. However ever since agencies started trying to professionalize the cybersecurity field it has drawn in new, fresh potential employees to the industry which is always a good thing. However with trying to put too many strict policies in place to weed out these new candidates it is reducing the possibility of a more qualified person even attempting due to overreaching pre requirements. The Department of Homeland Security sponsored a national research project that found realistically such professionalization can only be undertaken for specific occupations within the field, but not for the field as a whole. Depending on who you seem to ask depends on if you are told that drawing in every applicable candidate and then attempting to weed them out, or by over filtering the entrance requirements so that only the most ethical and moral are accepted into the cybersecurity field. We have found out in the past that most of the more successful individuals...

Words: 422 - Pages: 2

Premium Essay

Cybersecurity Vulnerability Facing It Managers Today

...CYBERSECURITY VULNERABILITY FACING IT MANAGERS TODAY INTRODUCTION Vulnerabilities in the recent cyber world varies from organization to another, depending particularly on the operations and what is on the ground. These varies from the web server weaknesses which allows hackers to take over the web server to very classy side network activities that use things like data or packet timing to gather confidential data from computers/networks. Vulnerabilities are liable and experience in the computers with which members of staff use to run their daily job requirements. The aim of this work is unveil these weaknesses facing Information System managers in recent time. Because the modern organization is clearly and predominantly associated with the use of information and information systems, this work does not focus particularly on any industry. 1|Page CYBERSECURITY VULNERABILITY FACING IT MANAGERS TODAY VULNERABILITY/ WEAKNESS COMPARE TO THREAT In cyber world, vulnerability is defined as the weakness a computer hardware or its software system that can be exploited. This is completely way different when we talk about cyber threats. A threat is simply the ways or means with which these vulnerabilities are being taken advantage of or exploited. A simple example of these threats is clearly seen in the case of a Malware/Spyware in a computer/network. This, depending on the target operation, exploits any available vulnerable aspect of the information system. These vulnerabilities when present...

Words: 2288 - Pages: 10

Premium Essay

Csec

...Government Intervening To Protect Our Cyberspace University of Maryland University College Table of Contents Introduction page…………………………………………………………………..3 Justification to Regulate Private Industry Cybersecurity………………………3-4 Real World Threat…………………………………………………………………4-5 Methods for Government Intervention:…………………………………….……5 Government’s Intervention Impacts on National Security………………….….5-6 Real World National Security Breaches…………………………………………6 Arguments of the Private Sector to Take Responsibility.................................6-7 Failure to Take Responsible Action................................................................7 Conclusion…………………………………………………………………………7-8 References.....................................................................................................8-9 Introduction In 1969, the first ever network was born into existence (ARPANET) also called advanced research projects agency network. The Government Defense Department worked diligently on this break through in order to link some of the United States most prominent research universities with a couple of purposes in mind:...

Words: 1747 - Pages: 7

Premium Essay

Dodi 8500.01

...Department of Defense INSTRUCTION NUMBER 8500.01 March 14, 2014 DoD CIO SUBJECT: Cybersecurity References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues and renames DoD Directive (DoDD) 8500.01E (Reference (a)) as a DoD Instruction (DoDI) pursuant to the authority in DoDD 5144.02 (Reference (b)) to establish a DoD cybersecurity program to protect and defend DoD information and information technology (IT). b. Incorporates and cancels DoDI 8500.02 (Reference (c)), DoDD C-5200.19 (Reference (d)), DoDI 8552.01 (Reference (e)), Assistant Secretary of Defense for Networks and Information Integration (ASD(NII))/DoD Chief Information Officer (DoD CIO) Memorandums (References (f) through (k)), and Directive-type Memorandum (DTM) 08-060 (Reference (l)). c. Establishes the positions of DoD principal authorizing official (PAO) (formerly known as principal accrediting authority) and the DoD Senior Information Security Officer (SISO) (formerly known as the Senior Information Assurance Officer) and continues the DoD Information Security Risk Management Committee (DoD ISRMC) (formerly known as the Defense Information Systems Network (DISN)/Global Information Grid (GIG) Flag Panel). d. Adopts the term “cybersecurity” as it is defined in National Security Presidential Directive-54/Homeland Security Presidential Directive-23 (Reference (m)) to be used throughout DoD instead of the term “information assurance (IA).” 2. APPLICABILITY a. This instruction applies to: (1) OSD, the...

Words: 19443 - Pages: 78

Free Essay

Trends of Cybercrimes

...The Future of Cybersecurity LaToya Crook BCC/403 October 26, 2015 Professor David Pettinari The Future of Cybersecurity The world in which we live is becoming more socially connected than ever before. It seems that technological advances have met, if not exceeded, anyone's expectations as new ways to communicate continue to develop. Due to the innovations of mobile connections, global technologies, and the ominous cloud, information can be shared and accessed at the touch of a screen or the sound of one's voice. Digital equipment that were unheard of just five years ago now inundates both professional and personal arenas. As a result, organizations, as well as their employees, have begun to feel the pressure placed on them to address current and potential threats to the security of their systems and clients (CloudTweaks, 2013). Cybercriminals can retrieve and analyze information gained through technological access from a single business or entity and use such confidential data to give competitive advantages to other organizations, to satisfy the requests of influential individuals, or to benefit national security. The World Wide Web permits immediate and boundless communication and the ability to interface on a global level, which can have its downfalls just as much as its benefits. Unapproved access to, and abuse of, information, technology and fundamental systems can irreparably damage a person or organization’s character, financial status, sense of stability and...

Words: 1962 - Pages: 8

Free Essay

Cybersecurity

...Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 February 2012 Authors’ Note F or the last year, the John L. Thornton China Center and the 21st Century Defense Initiative at Brookings have convened a working group on cybersecurity and U.S.-China relations, which the two authors organized and co-chaired. The research was motivated by our sense that: 1) the many policy issues involved in cybersecurity, especially in its impact on foreign relations, were already significant and would grow rapidly in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited...

Words: 17963 - Pages: 72

Premium Essay

Private and Public Sector Cyber Security Needs

...Private and Public Sector Cybersecurity Needs George Gritten Table of Contents Executive Summary 3 Introduction 4 The Current State of Cybersecurity 4 The Evolution of Cybersecurity 7 Moving Towards a More Secure Tomorrow 9 Conclusion 10 References 11 Executive Summary Today’s world is quickly evolving into a world that relies solely on technology as a way to do business and communicate. With this move towards a technology-centered society, both public and private sectors have to keep up with and evolve just as quickly, while trying to be proactive when it comes to security. The world today is not as safe as it once was, and as it changes to a more paperless, technological-based society, access to information is becoming increasingly accessible. With this, cyber-attacks and security breaches have become a significant risk of doing business. As hackers, botnets, and various other cyber-based threats have become progressively more malicious and continue to attack organizations and governments alike, a prevailing question is how to unite the public and private sectors so that they can evolve to defend against that which they cannot see. Introduction Today's reality is rapidly advancing into a world that depends exclusively on technology as an approach to work together and connect. With this move towards a technology-focused culture, both government and private sectors are needing to stay aware of and develop almost as fast, while attempting to be proactive...

Words: 2198 - Pages: 9

Free Essay

Csec 620 Individual Assignment 1

...IA#1 Cybercrime Law, Regulation, Effects on Innovation John Doe CSEC 620 Section 9022 Note: This paper was submitted through originality check websites. Table of Contents 1. Introduction 3 2. Private Industry & Regulations 4 3. National Security Concerns 4 4. Methods 6 5. Impacts of Government Regulation 7 6. Compliance 8 7. Responsibility 9 8. The Real World 10 9. Conclusion 11 References 12 1. Introduction Cybersecurity and cybersecurity initiatives are commonplace in all aspects of our digital lives. Personal computers are still widely used, especially in the workplace, but mobile devices seem to be the preferred computing choice of the average person. This would include but not be limited to; smart phones, tablets, and laptops to name a few. Mobile devices have changed the digital landscape in a manner that could not have been predicted. This is because other than work or school related activities, most personal computers were used to play a few games, check email, and browse the internet. These activities eventually transitioned over to the aforementioned mobile devices. Now we mix in social media, and a whole new digital cyber-world has emerged. Talk about getting your head out of the clouds. We live in the cloud, literally and figuratively. What does this mean to the average consumer? Perhaps not much. Most people who operate in the digital world could probably care less about the underpinnings of cyberspace and...

Words: 2894 - Pages: 12

Premium Essay

Cybersecurity In Health Care

...This chapter highlights the importance of cybersecurity in the healthcare sector. It gives a brief overview of the importance of cybersecurity in healthcare, issues faced by organizations when implementing cybersecurity, and our recommendations for organizations on how to achieve greater security. Importance of cybersecurity in healthcare Cybersecurity has been a major talking point in virtually every industry, especially the healthcare industry. Federal regulations mean serious repercussions for breaches, so security is the top priority for most chief information officers (CIOs) in the healthcare sector. Factors Cost There were 100+ data breaches among healthcare organizations in 2016 alone, and industry experts estimated the cost of lost...

Words: 1491 - Pages: 6

Free Essay

Internet Governance

...| January 30 2014 | Critically analyse the main global governance issues relating to the internet and discuss how well these issues are being addresses at a global level. Word count: 1,986 | Global Governance | The internet has massively changed the business world. The internet has given companies the opportunity to increase their output and improve their competitiveness. The internet has allowed a company to work outside its base. E.g. a company’s headquarters is based in the UK, but they have a call centre in India where wages are a lot lower. According to (Society 2013) the internet works and runs the way it does, not because of government instructions or the intergovernmental agreement, but because internet governance is comprehensive, transparent and collective. The internet allows innovation, exchange of information between counties and flow of ideas. Furthermore it encourages economic growth, in return contributing to social and economic development. The term ‘Internet governance’ is used in more context that one. It applies to activities such as; coordination of technical standards, development, operation of critical infrastructure legislation and regulation. The internet is not restricted to government activities. There are different types of stakeholders and each of them has a different role in defining and carrying out Internet governance. There is not one specific person, company, organisation or government that runs the internet. It is made...

Words: 2112 - Pages: 9