Cyber Security Information

 The Effectiveness of US Cyber Security

The inevitable and continuous advancement in technology brings the terror of cyber dilemma. There are many risks that involved the cyber world. Among these are the viruses that are erasing the system, hackers breaking into your system and altering files, people using your computer to attack others, someone stealing you credit card information to make his own purchase. Hackers and terrorist attacks prompted the mandate on cyber security. When we say cyber security, we are dealing with the prevention, detection and response to attacks involving information in your computers
Glimpse on Cyber Security

Information technology is continuously changing. People are more adept to computers nowadays. Communications, transportation, entertainment, shopping medicine are greatly controlled by computers and the internet. A large percentage of the daily activities of an average person have been utilized in the presence of these breakthrough technologies. True enough, the idea of storing your personal information in your own computer or to other computer is very promising.

Just four years ago, security experts have not been meeting their points on whether US government has protected the cyber world properly. But the only thing that they have agreed upon is the fact the increased threat produced in mainframe systems which are running in Windows and connecting to the Internet. It has been the dilemma on bureaucratic system and the lack of focus in the people involved in the task that makes us more susceptible to cyber problems. Another compelling reason is the fact that four years ago, threats on information structure, specifically on mainframe, is not considered as a threat at all. No solid attention has been given in the issue.

On the other aspects, US allotted big budget in the protection of the cyberspace. But the lack of concern and wrong set of priorities seems to put the problem at bay. Although, it has been suggested throughout that people should be well-informed in the latest threats and vulnerabilities, the issue still exists as of today.

Cyber Security Today

“Every bit of information throughout the Internet could be monitored by the government. This is going to be a very thorny development.” This is how the US government would like to do in response to cyber space threats. All communications made in the Internet should be read by the federal government. In this scenario, the people will be forced to give up the right to privacy in order to protect security, public transportation and other critical procedures made in the Internet. The fact of the Internet being an open database makes it more susceptible to vulnerable attacks. The security of the information systems is largely a matter of consistent and applicable methods.

Another step in cyber security is providing a Wikipedia style of database wherein the agencies can share different views and information regarding the matter.
Despite the effort of the US government, some people say that the federal government has failed to reinforce the outbreak of cybercrimes. It already cost their economy billions of dollars yet they failed to respond with enough resources, determination.

“The U.S. government has not devoted the leadership and energy that this issue needs,” said Paul Kurtz, a former administration homeland and cybersecurity adviser. “It’s been neglected.”

The White House has allotted $154 in protecting the cyber space yet they are more focused on online espionage than the international criminals lurking in the World Wide Web. In this aspect, the expected loss in the years to come is expected to reach a high percentage.

Congress has either failed to pass bills or sent ineffective legislation to the president. Agencies have shied away from imposing regulations. Leaders have not bothered to make sure computer users understand the problem – if the officials themselves even comprehend the threats.
Weaknesses of Cyber Security Policies

Accessing all the information of other people will give you safety is the same things that once in the brains of Hitler and Stalin, and also Mao. They each have their own spies to feed the necessary information in various matters that they assumed that can make them safe. In other words, the same things are the ones being conceptualized was once in the minds of these famous dictators.

Although admittedly, going against the plans of the US government is not a very bright idea considering the fact that the people are the key reasons of the cyberspace threats and vulnerabilities. If the people have already resigned in protecting the cyber world, the only thing left is the government to do the work.

Strength of Cyber Security Policies

It is a good thing that the federal government can provide ample budget in combating cyber space problems. The key to guarantee the best tools in doing so is having the proper financial allocation. Although, online espionage is the main priority of the US government, I must admit it is still a good tactics. Once the government gets hold of the people behind it, they will able to fully learn the principles in online threats. In this way, they can be able to apply whatever they have encountered in other aspects of cyber space dilemma such as online theft.

The Wikipedia style of platform is so far a very good idea. An access to different strategies of key people and agencies is a way of learning to everyone. Application of these strategies will be helpful in minimizing the alarming losses contributed by the World Wide Web.

Even though, combating the cyber space terrorists, passing a bill that reinforce the law to take actions in administering charges and victims being able to seek retribution are a good step. It at least will put a defensive strategy in protecting the user of the World Wide Web.

News.com enumerates the provision of the bill.

· Existing law would be changed so that federal prosecutors can go after supsected cybercriminals even if the crime occurs within a single state (currently, hackers must engage in criminal activity across state lines for federal prosecutors to get involved).

· The current law would also be made tougher by removing a requirement that computer crimes have to result in a loss of at least $5,000 before prosecutors can pursue the case.

· It would become a felony, punishable by fines and up to five years in prison, to damage 10 or more computers with spyware or keyloggers
Bibliography:

Lyman, Jay (2004). Is U.S. cyber-security policy leaving critical mainframe systems at risk? October 18, 2004, from http://www.linux.com/feature/39583

Jones, K.C. (2008). National Intelligence Director Wants To Monitor All Net Communications. January 18, 2008, from http://www.informationweek.com/management/showArticle.jhtml?articleID=205901409&

Tech Policy Central (2008). Govt.’s Fight Against Terrorism Hitting Net. January 21, 2008, from http://www.techpolicycentral.com/2008/01/govts-fight-against-terrorism.php

Garett, Sean (2007). The Great Cybercrime Delusion. November 13, 2007, from http://463.blogs.com/the_463/2007/11/the-great-cyber.html 


Enjoy big discounts

Get 20% discount on your first order