Concept and Problem of Cyber Domain in US Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Admittedly, the development of technology resulted in the beginning of Information Era. People have developed a brand new space – cyber domain. Cyberspace suggests numerous opportunities, but it also contains many threats. One of the major concerns related to cyberspace is national and personal security.

First, it is important to define the term “cyberspace”. According to the National Military Strategy for Cyberspace Operations cyberspace is a “domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange date via networked systems and associated physical infrastructures” (Lopez 2007).

Three decades ago, when networks were only under development the issues of security were not taken into account, but in the beginning of the twenty-first century these issues have become of primary importance (Hancock 2006, 6).

As far as U.S. military networks are concerned it is necessary to point out that cyberspace used is secure and safe from possible attacks. However, when it deals with private sector, cyberspace is vulnerable to various attacks. For instance, U.S. power grid is one of the most vulnerable spheres for cyber attacks since it belongs to a private sector and it is not governed by the government (Cyber War – The Aurora Project 2009).

There is no effective security software in this sector and this can be extremely dangerous for the country. For instance, numerous incidents of attacks have been staged to reveal the most vulnerable places.

The consequences of real attacks can lead to million dollars losses in every state. It goes without saying that this opportunity is not considered only by IT-professionals and government, but can be used by cyber terrorists as well.

U.S. power grid is not the only example of cyberspace vulnerability. Nowadays almost all sectors of U.S. economy rely on cyberspace. Hospitals, schools, banks and large companies are all potential targets of cyber attack. Unfortunately, there are still no effective regulatory regimes which could secure not only military cyberspace, but private sector cyberspace as well.

That is why nowadays military networks have to cope with outcomes of cyber attacks rather than focus on these attacks prevention.

It is necessary to point out that the United States address the problem and try to work out strategies and methods of regulating cyberspace, detecting various threats and neutralizing them (Lopez 2007). However, the issues of security are still under discussion, since new problems and possible threats emerge.

More so, it is important to remember that cyberspace is not confined to certain physical boundaries. It is possible to attack cyberspace from different countries. In fact, anyone who has access to the Internet can potentially threaten any company or organization’s security.

Therefore, it is essential to launch international meetings which would address issues of cyberspace security. Unfortunately, nowadays countries try to solve these problems in their own ways. However, the good news is that governments of different countries start cooperating in this field.

In conclusion, it is possible to point out that nowadays the issues of cyberspace security come in the fore. U.S. government pays much attention to these issues trying to detect possible threats and work out effective strategies to prevent any type of cyber attacks. Unfortunately, major part of cyberspace belongs to the private sector and it is often difficult to govern it.

One more constraint that any country faces is the absence of international regulatory regimes which could minimize the number of possible cyber attacks. Fortunately, the process of international cooperation in this field has begun.

Reference List

Cyber War – The Aurora Project. 2009. Youtube.

Hancock, Bill. 2006. “How to Stop Talking About- and Start Fixing – Cyber Security Problems.” Cutter IT Journal 19 no. 5: 6-11.

Lopez, Todd. 2007. “.” Air Force Print News. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, May 4). Concept and Problem of Cyber Domain in US. https://ivypanda.com/essays/cyber-domain-essay/

Work Cited

"Concept and Problem of Cyber Domain in US." IvyPanda, 4 May 2019, ivypanda.com/essays/cyber-domain-essay/.

References

IvyPanda. (2019) 'Concept and Problem of Cyber Domain in US'. 4 May.

References

IvyPanda. 2019. "Concept and Problem of Cyber Domain in US." May 4, 2019. https://ivypanda.com/essays/cyber-domain-essay/.

1. IvyPanda. "Concept and Problem of Cyber Domain in US." May 4, 2019. https://ivypanda.com/essays/cyber-domain-essay/.


Bibliography


IvyPanda. "Concept and Problem of Cyber Domain in US." May 4, 2019. https://ivypanda.com/essays/cyber-domain-essay/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1