search

Cyber Security Policies and Solutions in the United States

Essay details

Please note! This essay has been submitted by a student.

When researchers at the Advanced Research Project Agency invented the precursor to the Internet, they couldn’t have imagined the ubiquitous impact of their creation. Today, the USA and the world rely on the Internet for an exhaustive range of services. This dependence renders us all – individuals, militaries, businesses, schools, governments – vulnerable in the face of a cyber-threat. More than 20 billion devices are expected to be connected to the Internet by 2020. The risks introduced by the growing number and variety of such devices are substantial.

Essay due? We'll write it for you!

Any subject

Min. 3-hour delivery

Pay if satisfied

Get your price

The factors which make Cyber Security one of the most challenging endeavors are:

  • Geographical distances and logistical difficulties cease to exist in case of cyber-attacks.
  • Cyber-attacks do not come with precursory warnings.
  • It is often difficult to track the origin of an attack and therefore difficult to retaliate.
  • A cyber-attack proliferates at an unprecedented rate.
  • The cyber space can’t be fully controlled or regulated.
  • Lack of clarity in legislation.

POLICIES

The United States is committed to an open, secure, interoperable, and reliable Internet that enables prosperity, public safety, and the free flow of commerce and ideas. These qualities of the Internet reflect core American values – of freedom of expression and privacy, creativity, opportunity, and innovation.

In order to entrench a cyber space conducive to the above ideals the United States emphasizes the following guiding principles:

  • Information sharing and interagency coordination.
  • Build bridges to the private sector recognizing its important role in a comprehensive solution.
  • Building alliances, coalitions, and partnerships abroad.

As articulated in the International Strategy for Cyberspace, the United States will continue to respond to cyber-attacks against U.S. interests at a time, in a manner, and in a place of our choosing, using appropriate instruments of U.S. power and in accordance with applicable law and the principle of proportional punishment.

Provide the necessary knowledge, training, and other resources to countries seeking to build technical and cybersecurity capacity.

  • Preserve global network security and stability, including the domain name system (DNS).
  • Promote and enhance multi-stakeholder venues for the discussion of Internet governance issues.
  • Harmonize cybercrime laws internationally by expanding accession to the Budapest Convention.
  • Focus cybercrime laws on combating illegal activities, not restricting access to the Internet.

SOLUTIONS

  • Build and maintain ready forces and capabilities to conduct cyberspace operations:
  • Building a competent cyber workforce,
  • Improving recruitment and retention,
  • Maintaining a persistent training environment,
  • Develop and implement exchange programs with the private sector;

Support the initiative for cyberspace education:

  • Developing policies to support the Initiative for Cybersecurity Education.
  • Working with interagency partners, one or more educational institutions, as well as state and private sector partners, to continue to support innovative workforce development partnerships focused on both the technical and policy dimensions of cybersecurity and cyber defense.

Account for the dynamic nature of cyberspace:

Realize that cyberspace is an immensely evolving domain and to maintain security over a sustained period, constant development is essential. To this end there must be acceleration in R&D and proper identification of evolving cybersecurity risks that affect national security, public health and safety, and economic security.

International sharing of research:

There must be an annual conference of representatives of nations to discuss specific advancements in cyber space both in light of new threats and potential solutions. A journal should be published to provide impetus to transparency and dissemination of information.

OUR CYBERSECURITY IN ACTION

In July 2017, the United States Secret Service, through a synchronized international law enforcement operation, affected the arrest of a Russian national alleged to have operated BTC-e. From 2011 to 2017, BTC-e is alleged with facilitating over $4 billion worth of bitcoin transactions worldwide for cyber criminals engaging in computer hacking, identity theft, Ransomware, public corruption, and narcotics distribution. Researchers estimate approximately 95% of Ransomware payments were laundered through BTC-e.

Get quality help now

Prof. Johnson

Verified writer

Proficient in: Privacy & Security, Computer Science

4.9 (1373 reviews)
“Good paper. Just have to change the heading to what was on the article instead of what you thought it should be.”

+75 relevant experts are online

More Essay Samples on Topic

banner clock
Clock is ticking and inspiration doesn't come?
We`ll do boring work for you. No plagiarism guarantee. Deadline from 3 hours.

We use cookies to offer you the best experience. By continuing, we’ll assume you agree with our Cookies policy.