Private And Public Sector Cyber Security Needs

2198 words - 9 pages

Private and Public Sector Cybersecurity Needs
George Gritten

Table of Contents
Executive Summary 3
Introduction 4
The Current State of Cybersecurity 4
The Evolution of Cybersecurity 7
Moving Towards a More Secure Tomorrow 9
Conclusion 10
References 11

Executive Summary
Today’s world is quickly evolving into a world that relies solely on technology as a way to do business and communicate. With this move towards a technology-centered society, both public and private sectors have to keep up with and evolve just as quickly, while trying to be proactive when it comes to security. The world today is not as safe as it once was, and as it changes to a more paperless, ...view middle of the document...

The Current State of Cybersecurity
Research has shown that cybersecurity has increased greatly since 9/11 for both the government and private sectors. Cybersecurity has become a billion dollar industry, yet government and private sectors are still under constant threat from external and internal attacks (i.e. Target, NSA). Cybersecurity is not just a government issue and “the nation’s businesses manage a significant share of online activity related to national security;” therefore they “must play a larger role in ensuring the overall integrity of system” (Etzioni, 2011). Recognizing this shared responsibility is vitally important. In a recent report commissioned by Dell, “17% of the IT budget/revenue is allocated to IT security, which in the private sector equates to an average annual spend of $96M” (Bourne, 2014). In numerous occurrences basic precautionary measures, low budgets and lack of accountability are glaring holes in the armor of cybersecurity.
According to a recent Senate cybersecurity report, there are “repeated failures by federal officials” including “installing security patches, updating anti-virus software, communicating on secure networks and requiring strong passwords” (Timberg and Rein, 2014). The report also found that a frequently used password on many federal systems was “password” (2014). Many federal and private security issues are simply because basic security measures are not being taken. As noted by the Rachel King, the Department of Energy (DoE) has been breached at least 3 times over the past few years with systems being allowed to operate even though they were known to have critical and high vulnerabilities (King, 2013). If funding, or lack thereof, could be used as an excuse for any of the known breaches the DoE was never upfront about it or expressed any cause for concern.
Government agencies and organizations are more reliant than ever on computers and technology to improve efficiency and viability. On the other hand, the expansion of information technology produces open doors and holes to readily access government and corporate systems. Recent reports and news indicate that the amount of cybersecurity threats and occurrences have expanded significantly and have brought about significant economic loss and sensitive information leaks worldwide. Clearly, how to improve cybersecurity or, then again, how to keep frameworks from being broken are key inquiries for any agency or organization to think about. Attention to the criticalness of cybersecurity is evidenced by the exponential rise in information security investments.
For many years now representatives in Congress, business executives and the like have been proposing and debating proposed initiatives to combat rising cyber threats, but staunch opposition from other departments and groups with their own agendas have hindered those initiatives from moving forward. In 2012, the U.S. House passed the Cyber Intelligence Sharing and Protection Act (CISPA) in...

Other assignments on Private And Public Sector Cyber Security Needs

Modern Day Attacks Against Firewalls And Vpns

2441 words - 10 pages taking our access to the Internet either with a phone or at home for granted. This is how we can all contribute to cyber security. Ultimately as a nation, our government needs to develop laws and policies against the wrongful use of the Internet and attacks against institutions and infrastructures. In an article written by Ted Gotsch he talked about policies for information sharing which would allow discussions of critical attacks to public and

Assignment 2: Critical Infrastructure Protection

1124 words - 5 pages We Do, 2015). Our country’s safety relies upon resilient and secure critical infrastructure. The National Infrastructure Protection Plan (NIPP) outlines how private sector and government participants in the critical infrastructure community collaborate to achieve security, manage risks and resilience outcomes (National Infrastructure Protection Plan, 2013). NIPP offers a modernized approach to critical infrastructure resilience and

Operation Receiver

607 words - 3 pages . The exercise took place in 1997 and the was a no-notice Joint Staff exercise designed to test DoD planning and crisis action capabilities when faced with attacks on DoD information infrastructures ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The Red Team was played by the National Security Agency which used hacker techniques and software programs that were freely available on net ("Interviews - John Hamre | Cyber War

Cyber Crimes

1600 words - 7 pages , the website was receiving more than 2,000 visits per second. Healthcare, government, industrial businesses and professional services continue to be the major industries affected by cyber crimes. Businesses continue to improve and increase their cyber security measures. However, cyber criminals are inventing new ways to circumvent these systems. For these reasons, information security has quickly become a primary focus for businesses as well

Dentro Me

2107 words - 9 pages reduce their absence levels. The main challenges they face, in terms of the most common causes of absence, include minor illness, acute conditions, musculoskeletal injuries, back pain, stress and mental ill-health. Public sector summary As in the private services and non-profit sectors, the average level of employee absence in the public sector has fallen compared with last year. Moreover, there is some indication of a fluctuating but generally

Private Sector Study On Education

2557 words - 11 pages revenues are considered (agnostic as to source of funding) and compared against the positive outcomes that are generated, private sector and public sector -year (or shorter)institutions look a lot alike: they take in roughly $5,000 of revenues to produce a positive outcome of graduation or transfer.5 This neck-in-neck cost to society clearly needs to be evaluated against the value of those degrees. Student Return on Educational Investment The NCES

Terracog Gps Case

4326 words - 18 pages feasible. At a minimum, PCS unreliability will encourage public discontent and unease. Security for PCS should be paramount given the potential consequences, and will only grow in importance as newer PCS (with more acute vulnerabilities) are installed. Unfortunately, budgetary restrictions for utilities are often manifest in PCS administration, where funding for personnel and equipment are many times clearly inadequate. Another problem is

Cyber Crime

262 words - 2 pages Cyber crime: The internet has become a part of our everyday lifestyle and made it easier for us in many ways. Although like many things in life, it also has its disadvantages as well. One of the major disadvantages with the internet is cybercrime. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. The term “Cyber Crime” has nowhere been defined in any statute or Act passed or enacted by the Indian

Academic Paper

407 words - 2 pages , spread daunting and formidable news and information and post scary images to threat the supremacy of the government and government affiliated individuals and to scare general public. Cyber terrorism and the activities: The tactics which are used by cyber terrorists generally include insurgency, paper terrorism, internet suicides, internet bombing, proxy bombing, aircraft hijacking, and propagandas. Some instances of Cyber Terrorism: Public’s

Opsec And Terrorism

5936 words - 24 pages appropriate OPSEC measures) that is designed to capture and mitigate such vulnerabilities before the adversary is able to exploit them (15). While there are many security programs within the Military (as well as the private sector), OPSEC is unique among them because it considers vulnerabilities from an adversarial perspective, a process colloquially referred to as "Thinking like the Wolf". One must exercise caution when naming adversaries, as

Database Security

281 words - 2 pages various issues surrounding the sector. * Database security research paper has attempted to explore the issues of threats that may be poised to database system. * The paper has also discussed the requirements that are set for a robust database management system. * Lastly, the paper has looked at the process for managing a database system and has discussed all the steps that need to be taken. * Q & A * REFERENCES

Similar Documents

Private And Public Security Essay

5214 words - 21 pages Private security and public policing Karen Swol I n recent years, both the number of police officers in Canada and the crime rate have been declining. However, the rates for many workplace or white-collar crimes, such as computer crimes, employee theft, and fraud, are increasing. Public police do not always have the resources to handle these “internal” crimes. In some cases, for example, a fraud of at least $100,000 must be committed for

Public And Private Agencies Essay

442 words - 2 pages different ways of offering services to their clients, the diverse needs of clients or patients gets affected whereby private agencies satisfy the needs of the clients in order to win their trust while the public agencies provide the services just to respond to their mandate (Lipsky, 2010). As a professional, ones job might be affected by other direct service providers or managers while working in these two settings of private and public agencies

Cause And Effect Essay

957 words - 4 pages lost the security and comfort of their homes and can no longer escape their harasser. With cyber-bullying being increasingly wide-spread, it is essential that schools incorporate cyber-bullying prevention into their anti-bullying policies. Works Cited Campbell, Matthew. “School Policy Responses to the Issue of Cyber-Bullying.” Journal of Catholic School Studies 83.2 (2011): 62-69. Print. Schneider, Shari K., Lydia O’Donnell, Ann Stueve, and Robert W. S. Coulter. “Cyberbullying, School Bullying, and Psychological Distress: A Regional Census of High School Students.” American Journal of Public Health 102.1 (2012): 171-177. Print.

Cyber Law Essay

3963 words - 16 pages rules prescribe the eligibility, appointment and working of Certifying Authorities (CA). These rules also lay down the technical standards, procedures and security methods to be used by a CA. These rules were amended in 2003, 2004 and 2006.Fundamentals of Cyber Law Information Technology (Certifying Authority) Regulations, 2001 came into force on 9 July 2001. They provide further technical standards and procedures to be used by a CA. Two important