This website uses cookies to ensure you have the best experience. Learn more

Cyber Crime: Cybersecurity For Cyberspace Essay

2123 words - 9 pages

Summary
Cyberterrorism, is an explosive and heavily volatile act that threatens the very fabric of networking operations of their intended target/s, and guess what, the United States “cyberspace” platform has provided a means of accessing our most secretive, sensitive, including, military tactical operations data. Successful attacks upon the US networking infrastructure would obviously impede governmental operation, more importantly; accessing a wealth of potentially destructive information would have profound implications, thus, Cybersecurity policies must be implemented. Cybersecurity policies create levels and barriers of networking security as their standards, guidelines, and response to potential threats, vulnerabilities, and consequential risk are greatly reduced.
Encompassing the security of “Cyberspace” is an extensive range of threat prevention and reduction techniques designed to thwart attackers from accessing the networking infrastructure. Cyberspace by definition is a platform in which communication through technology occurs. Thwarted with dangers that pose extreme risk, Cyberspace has become the premier criminal activity platform due to its perpetual anonymity resulting in the harm to another entities technology, commuters/servers, as well as storage databases. This policy proposal shall minimize vulnerability, increase prevention and deterrence while providing incident response standards and practices including perpetrator accountability (House, 2014).

Section I: Description of Policy
This “Cybersecurity” Policy sets forth the written rule and regulation of the .gov domain networking infrastructure conduct, network security disciplines, as well as type of threats, risks, and vulnerabilities in which investigation, arrest, and prosecution may be imposed in accordance with federal, state, and local laws. In addition to these ethics and code of conduct, it is recommended that all state jurisdictions implement the following framework as the bases to build upon within their localities. Securing “Cyberspace” (.gov domain) from becoming another statistical victim of “Cyberterrorism”, all implementations must be compliant with federal, state, and local laws, depending on jurisdiction, as well as adhering to all national standards of technology.
Applicable Laws
This policy is also in compliance with federal statues such as the following:
• Cyber Intelligence Sharing and Protection Act (H.R. 624), which focuses on information sharing and coordination, including sharing of classified information;
• Cybersecurity Enhancement Act of 2013 (H.R. 756), which addresses federal cybersecurity R&D and the development of technical standards;
• Advancing America’s Networking and Information Technology Research and Development Act of 2013 (H.R. 967), which addresses R&D in networking and information technology, including but not limited to security; and
• Federal Information Security Amendments Act of 2012 (H.R. 1163), which addresses FISMA...

Find Another Essay On CyberCrime: Cybersecurity for Cyberspace

Rule of law in Cyberspace as a means and way to cyber security

1066 words - 5 pages by the only stakeholder only, but on the every stage of Internet communication and governance: Internet-users, NGO, government and by means of fruitful international multistates cooperation. For that reason international technical standards and procedures are needed; − to create unified International norms or rules in cyberspace. At the same time, the strategy does not pretend to rewright existing norms (such as European Convention on Cybercrime

The Dark Side of the Internet

1357 words - 5 pages making major linkages with technology and the internet and this increases a company's cyber presence. If you just skimmed over this document you may have thought there was no hope for humanity. I must tell you the opposite. Yes, there is large groups actively attacking cyberspace, but the outlook in the future is good. If the trends of reporting cybercrime continue, and if countries nationally and internationally create extensive laws against

Susan W. Brenner’s CyberCrime: Criminal Threats from Cyberspace

2881 words - 12 pages Susan W. Brenner’s Cybercrime: Criminal Threats from Cyberspace is scary, exciting, and informative all in one book. It takes you on rollercoaster from start to finish as your eyes are opened to the realities of cybercrime and cybercriminals’ capabilities as our technologies have progressed. Brenner’s book is an excellent piece for those that are not savvy about technology terminology and cybercrime. Brenner opens by giving an example of the

Department of Defense Strategy for Operating in Cyberspace

2042 words - 8 pages needed cybersecurity efforts. This disparity initially created a large gap between the United States’ level of dependency on cyberspace or information technologies and its level of cybersecurity. As a result, foreign nations and non-state actors have worked persistently to exploit this capabilities gap by attempting and sometimes gaining access to both classified and unclassified networks, to include the Department of Defense (DOD) networks

Cyber Crime and Cyber Law

2705 words - 11 pages with the people who are quite educated and who have sufficient knowledge about the information technology (2010: A good year for fighting cybercrime? 2009). Computer and internet are only objects in these crimes because these types of crimes are done by very qualified and computer specialist persons. They use the computer or internet as a medium. Cyber crimes are a type of fraud, which requires knowledge and greater skill for accomplishing the task

CyberCrime

2955 words - 12 pages the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed. The advantages of technology and the internet have led more criminals to

Cyberspace: The Asymmetric Battlefield of the Future

2164 words - 9 pages strengthen collective cybersecurity efforts. This initiative is specifically derived from the International Strategy for Cyberspace and seeks to develop an international sense of situational awareness and defensive capabilities that will enable collective defensive and deterrent collaboration (International Security, 2011). An effective defense is only achievable in cyberspace if there is a sharing of indicators, specifics of cyber-attack events

Cybersecurity

1243 words - 5 pages cybersecurity. Cybersecurity is an issue that is growing in the government, industries, and for personal use. Researchers are looking at a variety of ways to increase cybersecurity in today’s world. One way to do this is by training individuals to stay ahead of the hackers. Students are being trained at universities in ways that stop or slow down threats to one’s computer. Grants are written so universities have the money to train students and in

Examples of War in Cyberspace

2881 words - 12 pages information and manipulating it for the purpose of propaganda. The term ‘war’ doesn’t necessarily imply that the war is a physical war in cyberspace because cyberspace is a virtual space, it is not tangible hence the method of warfare is unconventional to battles fought with soldiers and tanks. To simplify it even more one can say it is a ‘war of controlling information’ or attacking and altering websites for the purpose

Actions taken by the Australian Government to combat cyber crime

1182 words - 5 pages Cybercrime is a broad term used to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. They are almost impossible to stop due to technological advances and the power of anonymity on the internet. Governments have implemented strategies to try and prevent and fight these crimes in cyberspace but their effectiveness is questionable. It's a constant cat-and-mouse game as cybercriminals

Cyber Security

1295 words - 5 pages in order to protect their information and computer from hackers, viruses and malware that are in cyberspace. The United States government also has its own cybersecurity that is watching over the databases. The FBI has developed different branches to deal with cyber threats such as the CyberDivision and different cyber task forces. These branches contain a number of technicians that specialize in a number of different fields that help protect the

Similar Essays

Crime In The Cyber Realm Essay

1032 words - 5 pages Lessig (2006) takes a more technology-based approach to cybercrime, which he terms “Code” (p.5-6). Code is the hardware and software that composes cyberspace, therefore cyberspace administrators and developers are responsible for what is permitted and restricted over the Internet. With the Code theory, administrators and developers share some responsibility for the crimes in both mentioned cases because their lack of diligence led to the

Different Methods Of Cyber Crime And Their Effects On Modern Society

1363 words - 5 pages are constantly evolving with new technology, and as more and more technology is produced, the risks just increase (Department of Homeland Security, 2013). Please refer to Appendix A to view how cybercrime has kept up with the advances of technology and the internet since the first PC. As of recent times, cybercrime has accounted for the loss of nearly 400 billion dollars annually, and the cybersecurity market is worth around 60 billion this year

Importance Of Cyber Security Essay

2012 words - 8 pages infrastructure, there is an ever-changing need for policy update. During each administration, all have place importance on cyberspace and cybersecurity. During the Bush-ear cybersecurity policy was continuous and unsettled and implementation of the CNCI was insubstantial. President Obama, a hard-charger came in eager to eradicate his administration from the previous, his policy approach was significantly different to cybersecurity policy. Each

What Is Cyber Security? Essay

1085 words - 5 pages , cybersecurity was pushed closer into the light and was referred in the National Strategy for Homeland Security as a national concern and a “central component of the National Security” to cyberspace. Cybersecurity and cyber terrorism were concerns of the private sector and government agencies followed by the military and FBI, since the 1980’s (Bullock 284). In the Introduction to Homeland Security: Principles of All-Hazards Risk Management