1,126
10
Essay, 3 pages (600 words)

Cyber security policies and solutions in the united states

When researchers at the Advanced Research Project Agency invented the precursor to the Internet, they couldn’t have imagined the ubiquitous impact of their creation. Today, the USA and the world rely on the Internet for an exhaustive range of services. This dependence renders us all – individuals, militaries, businesses, schools, governments – vulnerable in the face of a cyber-threat. More than 20 billion devices are expected to be connected to the Internet by 2020. The risks introduced by the growing number and variety of such devices are substantial.

The factors which make Cyber Security one of the most challenging endeavors are:

  • Geographical distances and logistical difficulties cease to exist in case of cyber-attacks.
  • Cyber-attacks do not come with precursory warnings.
  • It is often difficult to track the origin of an attack and therefore difficult to retaliate.
  • A cyber-attack proliferates at an unprecedented rate.
  • The cyber space can’t be fully controlled or regulated.
  • Lack of clarity in legislation.

POLICIES

The United States is committed to an open, secure, interoperable, and reliable Internet that enables prosperity, public safety, and the free flow of commerce and ideas. These qualities of the Internet reflect core American values – of freedom of expression and privacy, creativity, opportunity, and innovation.

In order to entrench a cyber space conducive to the above ideals the United States emphasizes the following guiding principles:

  • Information sharing and interagency coordination.
  • Build bridges to the private sector recognizing its important role in a comprehensive solution.
  • Building alliances, coalitions, and partnerships abroad.

As articulated in the International Strategy for Cyberspace, the United States will continue to respond to cyber-attacks against U. S. interests at a time, in a manner, and in a place of our choosing, using appropriate instruments of U. S. power and in accordance with applicable law and the principle of proportional punishment.

Provide the necessary knowledge, training, and other resources to countries seeking to build technical and cybersecurity capacity.

  • Preserve global network security and stability, including the domain name system (DNS).
  • Promote and enhance multi-stakeholder venues for the discussion of Internet governance issues.
  • Harmonize cybercrime laws internationally by expanding accession to the Budapest Convention.
  • Focus cybercrime laws on combating illegal activities, not restricting access to the Internet.

SOLUTIONS

  • Build and maintain ready forces and capabilities to conduct cyberspace operations:
  • Building a competent cyber workforce,
  • Improving recruitment and retention,
  • Maintaining a persistent training environment,
  • Develop and implement exchange programs with the private sector;

Support the initiative for cyberspace education:

  • Developing policies to support the Initiative for Cybersecurity Education.
  • Working with interagency partners, one or more educational institutions, as well as state and private sector partners, to continue to support innovative workforce development partnerships focused on both the technical and policy dimensions of cybersecurity and cyber defense.

Account for the dynamic nature of cyberspace:

Realize that cyberspace is an immensely evolving domain and to maintain security over a sustained period, constant development is essential. To this end there must be acceleration in R&D and proper identification of evolving cybersecurity risks that affect national security, public health and safety, and economic security.

International sharing of research:

There must be an annual conference of representatives of nations to discuss specific advancements in cyber space both in light of new threats and potential solutions. A journal should be published to provide impetus to transparency and dissemination of information.

OUR CYBERSECURITY IN ACTION

In July 2017, the United States Secret Service, through a synchronized international law enforcement operation, affected the arrest of a Russian national alleged to have operated BTC-e. From 2011 to 2017, BTC-e is alleged with facilitating over $4 billion worth of bitcoin transactions worldwide for cyber criminals engaging in computer hacking, identity theft, Ransomware, public corruption, and narcotics distribution. Researchers estimate approximately 95% of Ransomware payments were laundered through BTC-e.

Thank's for Your Vote!
Cyber security policies and solutions in the united states. Page 1
Cyber security policies and solutions in the united states. Page 2
Cyber security policies and solutions in the united states. Page 3
Cyber security policies and solutions in the united states. Page 4
Cyber security policies and solutions in the united states. Page 5

This work, titled "Cyber security policies and solutions in the united states" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Cyber security policies and solutions in the united states'. 11 September.

Reference

AssignBuster. (2022, September 11). Cyber security policies and solutions in the united states. Retrieved from https://assignbuster.com/cyber-security-policies-and-solutions-in-the-united-states/

References

AssignBuster. 2022. "Cyber security policies and solutions in the united states." September 11, 2022. https://assignbuster.com/cyber-security-policies-and-solutions-in-the-united-states/.

1. AssignBuster. "Cyber security policies and solutions in the united states." September 11, 2022. https://assignbuster.com/cyber-security-policies-and-solutions-in-the-united-states/.


Bibliography


AssignBuster. "Cyber security policies and solutions in the united states." September 11, 2022. https://assignbuster.com/cyber-security-policies-and-solutions-in-the-united-states/.

Work Cited

"Cyber security policies and solutions in the united states." AssignBuster, 11 Sept. 2022, assignbuster.com/cyber-security-policies-and-solutions-in-the-united-states/.

Get in Touch

Please, let us know if you have any ideas on improving Cyber security policies and solutions in the united states, or our service. We will be happy to hear what you think: [email protected]