Importance Of Cyber Security Essay

2012 words - 8 pages

The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
People want the freedom and empowerment to use technology, while being protected against malicious actions. Protection starts with awareness and education, the government needs to begin empirical goals around previous campaign successes. President Obama noted, “The government is bringing about unprecedented transparency and liability for Americans to take part in their democracy.” (Obama, 2009).
Administration Key Cybersecurity Policy Principals
Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are a national asset and our defense, military, and private infrastructure is under constant attack. In recent years, investments on security for digital infrastructure have fallen short; the administration recognizes the need to take remedial steps. President Obama stated during the East Room announcement, “Responsibility falls upon no single agency or does authority to match the scope or scale of this challenge. When it comes to Cybersecurity, agencies have overlapping missions, and don’t communicate affectively, with each other or the private sector.” (Obama, 2009).
As a result of past inefficiencies, the administration, more specifically, President Obama, ordered the National Security Council along with the Homeland Security to conduct a thorough review on how the government protects and defends its critical infrastructure and recommend the best course of action for properly securing and maintaining integrity. (Obama, 2009). The council will integrate cybersecurity policies for the government in a cohesive structure. During President Obama’s East Room announcement it was noted, “Working closely with the Office of Management and Budget to make sure agency budgets show those priorities, assure federal cybersecurity...

Find Another Essay On Importance of Cyber Security

The importance of a comprehensive security policy for modern businesses

2140 words - 9 pages important to maintain the security of system software and data, in order to guarantee the unhindered operation.There is another system issue, risk assessment, which seems always not to be taken into much consideration.Everybody knows the necessity and importance of security assessment; nevertheless, we are always not clear how to do it, when to do it, and who should take this responsibility. This action is always closely connected with risk analysis and

The Importance of the United Nations Security Council

2118 words - 8 pages What is the importance of the UN Security Council? “The United Nations Security Council (UNSC) has primary responsibility, under the Charter, for the maintenance of international peace and security” (UNSecurity Council 2010). The end of the 1980s and the 1990s has been marked by major changes in international relations, both as practice and as an academic discipline. The collapse of the multi-polar system in the world politics, fall of the

Importance of Border Security

1166 words - 5 pages nation’s border, there is an essential need for border security. This has not been an easy challenge but it is something that has to be done otherwise imagine how great a disaster our nation would be. For over 86 years, the United States' approach to securing its border with Mexico has seen many changes and improvements, all of which have contributed positively to the prevention of illegal immigration, drug trafficking, and potential terrorism

The Need for a Well Organized Response to Cyber Attack

909 words - 4 pages serious cases, military and intelligence. The sharing of information between such entities is increasingly seen as important. Concerns about cyber-security are widely held. In its 2012 survey of senior decisionmakers in the public and private sector the World Economic Forum (WEF), found that cyber-security was ranked especially high by respondents as a technological risk being of global importance.1 In 2011, Norton, part of the Symantec multinational

Military Cyber: An Evolution In Command Relationships

1693 words - 7 pages resources. A regional commander needs at least shared control of enough combat power to get the job done. USCYBERCOM recognizes the complexity and importance of command relationships concerning GCC cyber requirements. COCOMs are responsible for fighting wars. They determine what training services must be conducted to provide the specialized and general purpose forces needed in theater. Cyber support should not be treated differently. An

Cyber Warfare: Defending Against a New Form of Terrorism

972 words - 4 pages Introduction Cyber warfare is a new type of terrorism is the United States. The United States National Security Team is responsible for handling computer warfare battles against hackers. The government should invest more money and resources in cyber warfare defense to protect our nation’s economy and infrastructure that is heavily dependent on technology. Imminent Threat The threat of a cyber-attack on our nation’s infrastructure is now viewed

information security

574 words - 3 pages information security includes protection of information and property from theft, corruption, or natural disaster. This has to be done by allowing the information and property to remain accessible and productive to its intended users. The three most important objectives of information security are data loss prevention, application security and cyber security Firstly, the most important purpose of information security is data loss prevention. Data loss

Living in the Information Age

597 words - 3 pages the majority. America’s Effort in Thwarting Cyber-attacks Homeland Security (2014) reveals that the Secret Service has an Electronic Crimes Task Force, which focuses on locating and identifying Cyber criminals. This commission contributed to the arrest of international cyber criminals who are responsible for the loss of $600 million. The Secret service also controls the National Computer Forensic institute. This organization has an obligation

Cybersecurity-Case Study

950 words - 4 pages the first life classroom include: 1- “The biggest potential weakness in cyber security policy is when IT group do not have any support. 2- The staff who are responsible for cyber security policy are IT professionals, because we cannot expect that executive management to be aware of security issues. 3- IT group is responsible for making sure that cyber security policy is enforced including tools. 4- The best way of understanding effective cyber

Cyber Security

1295 words - 5 pages . Cyber terrorism is one of the major treat to all sensitive information in cyberspace. Cyber terrorism can be defined as the use of computers and technology to cause server disruption or widespread fear in society. Through cyber terrorism data that is sensitive to major corporation and government alike are in danger of being hacked then used against them. Cyber security helps defend against cyber-attacks by tracking the attackers back to the source

Stop Cyber Warfare Before It Happens

2884 words - 12 pages than the click of a mouse. The U.S. is comparable to an elephant, crippled by a mouse. However, cyber attacks are not only a danger to America’s on the national level; they are also a risk on the international front. Lieutenant Commander Matthew J. Sklerov in one concise statement summed up the immensity of cyber attacks, “Cyberattacks are one of the greatest threats to international peace and security in the twenty-first century” (201). The peril

Similar Essays

Overview Of Cyber Security Essay

1482 words - 6 pages the criminals or putting a stop to any online security breach. Catching fraudulent activity or the breach of security is of utmost importance but the crucial question is how. There must be a method to track the right background information of the individual and specific internet activity that could be linked to possible fraud or breach of security. As Ray, Ow, and Kim points out, “Thoroughly monitoring individuals past actions and medical

Importance Of Information Security Essay

1666 words - 7 pages Information security Information Security refers to the procedures and techniques which are composed and implemented to ensure print, electronic, or other form of private and sensitive information from unapproved access, utilization, destruction, divulgence, change, or interruption. (http://www.sans.org/information-security) Need for Information security Business objectives and privacy drive the need for Information security. For a period, data

Cyber Warfare: The Importance Of The New Digital Battlefield

2258 words - 9 pages webpages crashed, banking systems failed, and emergency communications were disrupted. However, due to the imaginative and rapid response of Estonia’s information technology professionals, many of Estonia’s information systems were able to remain unscathed after the attacks ceased. After the attacks, Estonia recognized the importance of cyber-security and adopted a policies and strategies to mitigate the success of future cyber-attacks. By

Rule Of Law In Cyberspace As A Means And Way To Cyber Security

1066 words - 5 pages During the last some decades we can find out a significant increasing of crimes committed through the Internet. The most dramatic thing is that such kind of crimes normally cover some countries and therefore international, unified way of prevention and investigation of cyber crimes is needed. There are numerous theories and ways to prevent cyber crimes, to ensure cyber security, but I would focus on some basic directions. There are two basic