“Evolution of Federal Cyber Security” by J. Roth Essay (Article Review)

Exclusively available on Available only on IvyPanda® Written by Human No AI

Legal integration progressions on cyber security in Asia, Europe, and the United States of America came into place at a very fast rate. It also led to immense development in technology within a very short time. As a result, recommendations for Federal Information Systems on security controls pointed out the importance of interrelationships, interoperability, and technical controls. These recommendations further suggested that the challenge of integration lies in global acceptance. However, later reports continued to show that there was visible progress to undertake mitigation of persistent weaknesses that were evident in most United States’ agencies. Even after training, the GAO report continued to demonstrate system control deficiencies due to failures in the identification of enough boundary security mechanisms, breakdown in the need to know, insufficient restriction of physical access, and improper identification of authentication of users to implement common security configuration policies (Roth, 2010).

Furthermore, there have been reports on lacked proper segregation of information technology duties due to inequities in access rights. Even after recent global threats such as H1N1, more than fifty percent of the audited agencies had not entirely given an address to continuity of operations and catastrophe revitalization planning. There were also missing nationwide information security programs showing delinking of agencies in the United States alone. Identification, facilitation, and integration keys to success include observation of many existing standards which comprise global challenges in risk management professionals. Application of process improvement frameworks to ensure understanding of business drivers of the team leading information systems was also proposed (Roth, 2010).

Whereas identification of parts of a full program and larger team is relatively easy, integration of the involved components may prove to be quite difficult. Sharing sensitive information among nations whose objectives are different is a daunting task given their obvious differences in political agenda. The integration will therefore be the best way to go about the issue since the idea of postmodernism has facilitated multiplicities instead of universalities (McAuley, Duberley & Johnson, 2008). Therefore, the rift created will lead to reluctance by agencies and therefore interfere with national integration. Given that the existing standards are extremely diverse, the formation of an integrated security system will require the use of similar standards to boost the security system of any organization that may be at risk of various security threats common in business organizations. This will in turn demand deconstruction of initial standards to contain uniformity which again is highly impossible in a postmodern world (McAuley, Duberley & Johnson, 2008). Although understanding of team business drivers through process improvement will change in unit construction, a lot of positive effort is necessary at any given time.

From this article, it is imperative to note that it is possible to change some of the conventional security systems and adopt new ones in a bid to meet new security challenges facing organizations in the 21st century. It is clear that the integration and incorporation of security systems worldwide on matters of global concern is extremely important. Despite the obvious boundaries in security systems all over the world, integrations should focus on report deliveries such that organizations are not deconstructed due to the presence of a world of diverse opinions that have been shaped by postmodernism. Despite diversities in global views on different matters, there is a need for collaboration on sensitive matters that relate to global security as those that concern human health. My mental opinion has been greatly affected to consider universalities on matters of absolute global impact. In addition, my individual perception regarding global issues will not be affected by postmodernism.

References

  1. McAuley, J., Duberley, J. & Johnson, P. (2008). Organization Theory, challenges and Perspectives: Postmodernism as a philosophy: the ultimate challenge to organization theory? Phoenix: Phoenix University Press.
  2. Roth, J (2010). Evolution of Federal Cyber security.
More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, January 14). “Evolution of Federal Cyber Security” by J. Roth. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/

Work Cited

"“Evolution of Federal Cyber Security” by J. Roth." IvyPanda, 14 Jan. 2022, ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

References

IvyPanda. (2022) '“Evolution of Federal Cyber Security” by J. Roth'. 14 January.

References

IvyPanda. 2022. "“Evolution of Federal Cyber Security” by J. Roth." January 14, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

1. IvyPanda. "“Evolution of Federal Cyber Security” by J. Roth." January 14, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.


Bibliography


IvyPanda. "“Evolution of Federal Cyber Security” by J. Roth." January 14, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

If, for any reason, you believe that this content should not be published on our website, you can request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1