StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Security and Business - Term Paper Example

Cite this document
Summary
The author concludes that cybersecurity is very essential to national and homeland security in it assists in barring computer hackers from accessing critical information. The private sector needs to adopt the best practice standards to ensure that it takes part in cybersecurity.    …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Cyber Security and Business
Read Text Preview

Extract of sample "Cyber Security and Business"

Cyber security and business In this contemporary world, people work and live in a world that is networked. Due to this reliance on internet, cyber security is very significant. Cybersecuirty will assist guard business and consumers, will bring important infrastructures on which the economy relies on, and improve national security. While calling for cybersecuirty, the government should approach the issue with care in order to guard innovation, privacy, open nature of the internet and liberty. However, the ever changing and interlinked nature of networks place cyber security at a risky place in that it is becoming hard to secure confidential information (Heiman 33-36). Therefore, the government and private sector must work hand in hand in order to enhance cyber security. The government is justified in telling the private sector how to enhance or improve cyber security because there is urgent need to protect and secure our processors/computers , financial institutions, confidential information on national security and other significant aspects of the governments infrastructure (Kirby n.p). The government is calling on a tough government regulation of what is posted in the cyber space. The government understands that the computer systems needs to be secure because of the ever increasing function of information and the rapid growth in e-commerce area have made cyber security significant to the economy. In addition, cyber security is important to the functioning of safety essential systems like response to an emergency and to the guard of government’s infrastructure systems. The private sector have been opposing governments efforts to impose stricter regulation of cyber security but it is of great significance to protect the telecommunication sector and electric grid that is in the hands of the private sector. If a United States of America enemy attacked the computer system or networks that control these sectors, private organizations that own them would have to handle these network themselves without government’s aid. Such a situation will leave the United States of America infrastructure exposed and vulnerable in case of cyber war with its enemies (Kirby n.p). Private sectors should understand that the world has changed and that we are in an information society where data or information matters, therefore, as organizations, this makes them the front line not the support system in influencing and determining what is exposed or disseminated. The government released that private industry has been lacking behind in cyber security and that banks, utilities and other private industries may require boosting their cyber security investments and spending in order to avoid problems. The government is ready to spend more money in ensuring that its telecommunication and electric grid is protected. Private industry need to understand that Cybersecurity attacks pose a great threat to job creation and economy in addition to the national security. It is the responsibility of the government to ensure that its information and network systems are well protected which in turn will lead to creation of jobs and eventually economic growth (Heiman 55). Contrary to the governments demand for regulation in cyber security, some private industry believes that there is no need for government regulation since if the government intervenes; it will limit private industry ability to enhance cybersecuirty. Such industries hold to the idea that government regulation limits and restrains innovation. They argue that private industries should be permitted to continue to be to create and adapt in reaction to new attack approaches in cyber space. In addition, private industry opposes regulation because it is very expensive which might hinder an organization’s flexibility to tackle the cyber security tribulation easily and effectively (Heiman 69). Methods of government intervention in cyber security There are some cyber security laws or regulations put in place in order to ensure that the government electric grid and telecommunication sector is protected. The government set up acts such as the Homeland security Act of 2002, Gramm-Leach Bliley Act of 1999 and Federal Information Security Management Act (FISMA). These laws or regulations authorize federal entities and financial bodies to guard their information and system. For instance, FISMA law applies to all government bodies and it demands for the establishment and implementation of standards, policies, tenet, and guidelines on computer systems and information security (Heiman 78-81). In addition to strict laws on cyber security, the government has tried to enhance cyber security by giving more resources in terms of money to conduct research on how to develop quality security software. Further, it is working with private industry to ensure that they secure their systems. In this collaboration, the method requires that plan calls be set up for cooperative purpose between private industry and the government. The plan call demands for the establishment of an emergency reaction system to cyber attacks and decrease the Country’s exposure and vulnerability to cyber threats (Kirby n.p). Effect on national security due to government regulations or requirements If the United States of America government fails to regulate cyber security, it is likely that computers hackers will rise. For instance, computer hackers might get access to significant information regarding the Air force fighter Jets parting with significant information about the security system of the United States of America. In addition, spies will get access to the telecommunication system and the electric grid and leave behind risky and dangerous computer codes that might crush U.S telecommunication system. Enemies would take advantage of the lapse in the failure to regulate an cause harm to the United States of America’s sensitive information (Kirby n.p). Effects on national security due to meeting minimum requirements National security will not be fully exposed since private sector will have developed mechanism to protect the U.S information system. It will be difficult for computers to penetrate into the information and steal sensitive information. Further, private industry and the government will have developed a proactive capability aimed at reducing the time required to react to cyber attacks. There will be increased homeland and national security in ensuring that there is collective responsibility in protecting the country’s important and sensitive resources and infrastructure. In a addition, private industries will go a step further to help in protection of the country via means such as establishing environments that motivates and endorses incentives for organizations to adopt broadly needed sound security practices. Thus, offering support for research required to improve future national protection and articulating to organizational managers the need to invest in cyber security in order to improve the nation’s security because a secure nation is an ideal place to do business (Heiman 99). Effects on national security due to exceeding the minimum requirements The impact of cyber security regulation on national security due to exceeding minimum requirements will lead to enhancement of situational consciousness of network threats and vulnerabilities within the government and the capability to act fast in order to decrease intrusions which has a great significance to the nation’s security. In addition, adhering to regulation would imply that the government would in a position to strengthen cyber security environment and eliminate the threat of computer hackers from accessing crucial and sensitive information regarding national and homeland security (Kirby n.p). Majority of the United States of America infrastructure is privately owned or operated by private industry. The private industry has a big role to play when it comes to cyber security issues linked with national and homeland security in accordance with the laid down government regulations. Homeland security is very significant and it requires collaboration on the part of the U.S government and the private industry. The government relies on private industry to assist protect the nation. Private industry have a responsibility to protect national via the development of best practice standards required for protection of critical infrastructure from cyber attacks that organizations should adopt via incentives like liability protection. If private industries implement such regulations, it will eliminate serious cyber attacks or widespread hacking. For instance, software companies will need to create more secure software and programs via economic incentives. This will make private companies that make secure codes or write secure programs responsible for any security flaw in their program or coding system (Heiman 63). The cyber security Act that was enacted in 2012 under the Obama administration seeks to regulate a number of critical infrastructure cyber networks rather than establishing innovative approaches to avert the ever-changing cyber threats. For years, government regulation has received criticism and opposition, which has slowed down the government’s pace in dealing with the changing cyber threats. Private industry aim at meeting the standard set by the government. The private sector advocates for Cyber intelligence Sharing and Protection Act of 2011 that calls for a collaborative way in tackling cyber realities. Businesses argue that this would in turn force the government to offer businesses or private sector with specific threat data and incentivize the issue of voluntarily sharing of private industry data, guarding businesses against regulations, lawsuits, and public disclosure. Further, they argue that the Act would safeguard American’s privacy by forbidding the government from forcing private industries to present to them certain information (Kirby n.p). Summarily, cyber security is becoming an issue that needs urgent attention from the government given the rate at which technology is developing. Cybersecuirty is very significant in that it will assist guard business and consumers, will bring important infrastructures on which the economy relies on, and improve national security. The government need to enact stricter laws to ensure that private industries are regulated as this will make them accountable and responsible on what they do. Cybersecurity is very essential to national and homeland security in it assists in barring computer hackers from accessing critical information. The private sector needs to adopt the best practice standards to ensure that it takes part in cybersecurity. References Heiman, James. Cybersecurity regulation is here. RSA security conference. Washington, D.C. McGraw-Hill, 2003. Print. Kirby, Calister. (December 4, 2003). Forum focuses on cyber-security. San Francisco Chronicle. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Security and Business Term Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Cyber Security and Business Term Paper Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/information-technology/1666718-essay-assignment
(Cyber Security and Business Term Paper Example | Topics and Well Written Essays - 1500 Words)
Cyber Security and Business Term Paper Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/1666718-essay-assignment.
“Cyber Security and Business Term Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1666718-essay-assignment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Security and Business

Twelve Security Attack Trends of 2011

This can bring many more opportunities for intruders and hackers (ComputerWeekly 2010) The eighth security threat is from the separation of Cyber Security and Business operations.... Tricks such as false promises and incomplete information are used to attract people for collection of personal information (ComputerWeekly 2010) The seventh security threat is from convergence of regulations of most countries and to have global laws for data security and privacy....
9 Pages (2250 words) Essay

Cyber crime and security affair in e-business

There is a greater risk to organizations from their own employees and business rivals in addition to hackers.... This essay discusses that technology is essential part of business today.... The internet has become a backbone and nervous system of business nowadays.... Effect of cyber crime on E commerce will be discussed in detail.... It will be established whether Cybercrime and cyber criminals are a threat to E Commerce especially online shopping....
24 Pages (6000 words) Article

Cyber Crime as opposed to Cyber warfare

Thus, it is stated here that the emergence of hackers and criminals that develop viruses and malware has jeopardized the security of public and private business information and records in an organization.... Problem Statement Although systems and software developing IT organisations (such as Microsoft, Apple, IBM) have been striving to deal with the rising menace of cyber crime, there is dire need to develop strong anti-virus software's to ensure information security....
11 Pages (2750 words) Research Paper

Four Fundamental Cyber Security Components

Your task is to investigate the need for cyber security and analyze the threats from which it protects business.... Name: Course: Tutor: Date: Executive summary This paper gives a detailed report on investigation on the need for cyber security and analyzes the threats from which it protects business.... Your task is to investigate the need for cyber security and analyze the threats from which it protects business.... cyber security is said to be a big issue for business costing not only lost revenue but damaged reputations and lost custom....
13 Pages (3250 words) Essay

Cyber Security Policy Initiatives

The present paper under the title "cyber security Policy Initiatives" concerns the policy of cyber security.... hellip; The system of technologies, procedure, and observance which are structured for protecting networks, systems, applications and important information from attacks, harm or entrance from unauthorized as well as unrecognized sources is what is known as cyber security.... With the ever evolving cyber world, cyber security is of paramount importance....
11 Pages (2750 words) Research Paper

Cyber Security as the Process of Different Security Measures

This essay analyzes that cyber security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data.... cyber security ensures the protection of assets of an organization, including servers, data, buildings, humans, and desktops.... cyber security is a global concern because cyberspace is increasingly becoming a crucial asset to nations.... cyber security is a global concern because cyberspace is increasingly becoming a crucial asset to nations....
6 Pages (1500 words) Essay

Cyber Security in Business Organizations

The new age of smart phones has built a collaborative environment where protecting information security and intellectual property has become a great concern.... Despite having a strong central security infrastructure in place, ownership is an important issue that drives information security forward, especially in situations where the business critical applications lie outside the infrastructure (Johnson and Goetz, 2007).... With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks....
5 Pages (1250 words) Case Study

Cyber Security, Network and Computer Systems Administrators, and Computer Programmer

"cyber security, Network and Computer Systems Administrators, and Computer Programmer" paper contain an annotated bibliography that reviews five sources for the following three occupations: cyber security, Network and Computer Systems Administrators, and Computer Programmer.... The dramatic growth in cyber-attacks such as ransomware, worms, Tranjon horse, viruses, zombies, and adware threats have taken a great toll among various business enterprises leading to a greater demand in the cybersecurity profession....
3 Pages (750 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us