StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cybersecurity - Literature review Example

Cite this document
Summary
This paper 'Cybersecurity' discusses the methods of government intervention while dealing with cyber threats, especially with regard to the laws that the government has set up. In addition, the paper will discuss the impacts of government regulation on national security. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Cybersecurity
Read Text Preview

Extract of sample "Cybersecurity"

? Cyber security Cybersecurity Introduction In the age of the internet and numerous computer advancements, the economic prosperityof the United States largely depends on the ability of the government to enhance security of the information contained in the internet. The government works closely with the private sector to ensure that cybersecurity laws are implemented in various sectors. This paper seeks to explore how the government can justify telling the private sector how to set up or improve their cybersecurity. The paper also provides arguments for the intervention of the government in cybersecurity. Moreover, the paper will discuss the methods of government intervention while dealing with cyber threats, especially with regard to the laws that the government has set up. In addition, the paper will discuss the impacts of government regulation on national security. #1 The private industry is vital in the provision of national security, in the United States. This is because the private sector is involved in the development of advanced security systems. Companies in the private sector are engaged in the research and development of security mechanisms, as well as gadgets that help in improving the country’s security. The National Security Agencies rely on information from the private sector to develop the security mechanisms in the country. The knowledge acquired from the research conducted is used as the basis for enhancing the country’s security. In this regard, the government has an obligation to tell the private sector what they can set up and improve their cybersecurity (Theohary, 2010). There are several ways, which the government can use in order to tell the private sector how to improve their cybersecurity. One of the ways in which the government can justify such an action is through introducing trusted internet connections, which will benefit all stakeholders in the private sector. This focuses on consolidating the external access points of the federal government with the access points of the private sector. This way, the federal government will manage to assure the private sector that all cyber threats are thwarted and can be prevented from occurring. This initiative can also ensure that the external access points are reduced, and all capabilities of security are adhered to by the private sector. Through the use of this approach, cyber threats are reduced since the government will monitor the flow of information, as well as the messages exchanged via the internet (Theohary, 2010). The government can also justify involvement in issues that relate to cybersecurity is through regulation of the information market. Market regulation plays a crucial role since it reduces the vulnerabilities, and the threats caused by market failure. The government should guide the private sector on how they should set up their cybersecurity since when the private sector is left alone to implement such provisions; competition in the market may result to poor quality services. The government should regulate how the private sector sets up cybersecurity in order to ensure that there is adherence to the set standards. Government intervention is always crucial since the private sector cannot follow standards if they are left alone to implement cybersecurity (Powner, 2010). There tends to be certain socio-political reasons and motivations, which precipitate the government to take part in cybersecurity. The most fundamental reason why the government takes part is because of the threat posed by terrorism. Since the September 11 attacks, the United States government has strived to ensure that all sectors are protected against terrorism. Terrorism is an issue of concern in the United States. The department of homeland security strives to ensure that all threats posed by terrorism are prevented. On this regard, therefore, the government intervenes in ensuring that the private sector does not become vulnerable to threats of terrorism. The other socio-political reason for the intervention of the government is because of the sensitivity of information shared over the internet. The internet contains confidential information, which is pertinent to the stability of the country. In order to prevent such information from leaking, the government has to be involved in cybersecurity issues that relate to the private sector (Kostopoulos, 2012). There are various methods that the government has put in place in order to ensure successful intervention and regulation of the private sector. These methods relate to laws, regulations, as well as acts that the government establishes with the aim of preventing cyber threats. One of the laws that the government has passed to enhance cybersecurity includes the Homeland Security Cyber and Physical Infrastructure Protection Act of 2010. This act gives the department of homeland security the mandate to enhance cybersecurity. This act also proposes the enforcement of requirements of cybersecurity in the private sector. Another legislation passed to enhance cybersecurity includes the Cybersecurity Enhancement Act of 2011. This Act addresses issues related to cyber threats in relation to the federal government, and the introduction of technical standards (Andreasson, 2012). The government has also passed laws such as the Cyber Intelligence Sharing and Protection Act. Under this Act, issues relevant to coordination and sharing of information are discussed. The other law passed by the government to ensure information security includes the Federal Information Security Amendments Act of 2012, which deals with issues that relate to FISMA reform. #2 The government regulation required to be implemented by the private sector has some impacts on national security. As a result of this regulation, the information security is enhanced in the United States. The implementation of government regulation by the private industry will bring a revolution in the information industry of the United States. Implementation of government regulation will see an end to the vulnerabilities, as well as security threats posed by cyber threats. Through government regulation, it will become possible to protect classified information and prevent unauthorised access to information that may be pertinent to the security of the United States. Government regulation will also lead to the implementation of standards, which will ensure that all Americans are protected from security threats that may emanate from the internet (Andreasson, 2012). Through government intervention in affairs of the private sector, it will become possible to track the progress of the private sector, especially with regard to how private entities handle information security. State intervention also allows the government to have an opportunity to deal with all issues, which relate to the security of the country. Security will improve considerably since the government will monitor all security mechanisms. In addition, the government will have an opportunity to control security and protect the private sector (Kostopoulos, 2012). Failure to comply with the cyber regulations and requirements may have far-reaching consequences on information security in the United States. Failing to comply with the regulations can lead to vulnerability of information and many instances of cyber threats. The protection of private information can also be at stake when the minimum requirements are not met. For example, when the private sector fails to follow the regulations, information is exposed to threats such as an attack by viruses, hacking, as well as unauthorised access. Hackers will have an easy time accessing information that belongs to the private sector. Institutions such as banks and information technology firms will be threatened when the minimum requirements are not met (Powner, 2010). Compliance to only the minimum requirements may also have an impact on information security in numerous ways. Such compliance guarantees adequate protection from cyber threats. As such, all organizations in the private sector should ensure that they meet the minimum requirements, which the government has set. However, all entities should ensure that they meet the comprehensive requirements of the security plan and not only the minimum requirements. Exceeding the minimum requirements may also have an impact on information security. It is illegal for the private sector to exceed the minimum requirements since the government does not have such a provision. Exceeding the minimum requirements interferes with the privacy of information, and it is a violation of the right to privacy. The private sector should not enforce laws and regulations, which the government does not mandate it to enforce (Kostopoulos, 2012). The private sector is a key player in national security, especially through the implementation of cybersecurity controls proposed by the government. One of the crucial roles played by the private sector is the development of software. The private sector takes part in the development of software, which assists in enhancing security mechanisms. Through implementing the security controls imposed by the government, the private sector is fundamental in national security. For example, following the minimum requirements of the cybersecurity requirements ensure the security in the entire country. The private sector is also valuable when it comes to the enhancement of national security since the government can outsource the services of the private sector, especially when the private sector has sophisticated infrastructure (United States, 2006). Conclusion In conclusion, the threat of cybersecurity can be regarded as one of the challenges facing the national and economic security of the United States. The government can justify involvement in issues that relate to cybersecurity is through regulation of the information market. Market regulation plays a crucial role since it reduces the vulnerabilities, as well as the threats that may be caused by market failure. The private sector plays a key role in protecting national security, especially through the implementation of cybersecurity controls proposed by the government. References Andreasson, K. (2012). Cybersecurity: Public Sector Threats and Responses. New York: CRC Press. Kostopoulos, G. (2012). Cyberspace and Cybersecurity. New York: CRC Press. Powner, D. A. (2010). Cybersecurity: Key Challenges Need to be Addressed to Improve Research and Development. London: DIANE Publishing. Theohary, C. A. (2010). Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress. London: DIANE Publishing. United States. (2006). National infrastructure protection plan: 2006. Washington: Department of Homeland Security Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Law Enforcement and E-Government Transnational Issues Research Paper - 1”, n.d.)
Law Enforcement and E-Government Transnational Issues Research Paper - 1. Retrieved from https://studentshare.org/information-technology/1479262-law-enforcement-and-e-government-transnational
(Law Enforcement and E-Government Transnational Issues Research Paper - 1)
Law Enforcement and E-Government Transnational Issues Research Paper - 1. https://studentshare.org/information-technology/1479262-law-enforcement-and-e-government-transnational.
“Law Enforcement and E-Government Transnational Issues Research Paper - 1”, n.d. https://studentshare.org/information-technology/1479262-law-enforcement-and-e-government-transnational.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cybersecurity

Psychological Aspects of Cybersecurity

The author of the following term paper "Psychological Aspects of Cybersecurity" states that present-day technologies and innovations based on the use of computer systems, mobile phones, and the internet have become extensively prone to cyber attacks.... Cybersecurity enables the protection of all data that outsiders might try to get access to.... Today, when the dependency on the use of computer systems and internet technology has increased significantly, the understanding and incorporation of Cybersecurity prove to be highly essential (“What is Cyber Security?...
10 Pages (2500 words) Term Paper

CyberSecurity Profile on the CIA

The same goes for the dissemination of documented procedures for those with roles related to them, CIA Cybersecurity Profile Table of Contents AC SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES 3 RA-2.... The CIA develops and documents security awareness and training policy and procedures, evident from its intensive focus on security issues tied to emerging IT and communication platforms, including the Internet (Clift, 2007)....
2 Pages (500 words) Essay

HHS Cybersecurity Recommendation

As a faithful representative of the Department of Health and Human Services (HHS) senior management and a Cybersecurity project manager, I have located key areas in regards to security that needs to be addressed with immediate effect.... The proposals made in this memorandum… Kindly put aside some of your precious time to take a look at the suggestions and recommendations made by a crew of experts in subject matter in HHS Cybersecurity department. 2....
2 Pages (500 words) Essay

The Effects of Mobile Devices on Cybersecurity

The term Cybersecurity refers to the process of providing security to devices such as computers, cell phones, smartphones, and tablets, as well as the whole internet.... In the current world, promoting Cybersecurity is of great importance because modern people increasingly depend on computer networks to store and transfer their confidential data/information.... Magid (2014) says that since such sensitive personal data is exposed to computer networks, hackers or other cyber criminals may intrude into the privacy of network users and empty their bank account if proper Cybersecurity measures are not in place....
5 Pages (1250 words) Essay

Cybersecurity Profile

The paper "Cybersecurity Profile" describes as stated in NIST's "Special Publication No.... 800-53 Rev 4" Guidelines for Assessing Security Monitoring in Federal Information Systems and Organizations, "every public organization must establish a SSP to create effective safety assessment plans....
5 Pages (1250 words) Essay

Improvement of Cybersecurity

This coursework "Improvement of Cybersecurity" describes how can government justify telling the private industry how to set up or improve Cybersecurity.... Indeed, it is also being believed that Cybersecurity is difficult to accomplish as cyber-attacks regularly overthrow the cyber defense system.... The study aims to discuss the intervention of the government for improving the Cybersecurity.... The objective of the study is to recognize the methods through which the government intervenes to enhance Cybersecurity....
8 Pages (2000 words) Coursework

Public Sector Cybersecurity Issues

The coursework "Public Sector Cybersecurity Issues" describes the main aspects of Cybersecurity.... This paper analyzes the effects of Cybersecurity regulations on the American food industry and the public sector, goals of lawmakers in the public sector.... Established Cybersecurity regulations have, however, affected the delivery of services in both sectors.... This paper will discuss private sector-public sector Cybersecurity issues with a focus on the American food industry....
6 Pages (1500 words) Coursework

Cybersecurity and Mobile Devices

he author of this essay "Cybersecurity and Mobile Devices" describes the issue of Cybersecurity in relation to mobile devices.... This paper outlines  Cybersecurity threats and discusses steps to be undertaken by the smartphone users would play a vital role in restricting cyber-security crimes largely.... Multiple-use of the smartphone has led to the development and spread of several issues such as Cybersecurity, which inhibits the ability to gain vital user data from smartphones and making it available for other users....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us