“Evolution of Federal Cyber Security” by J. Roth Essay (Article Review)

Exclusively available on IvyPanda Available only on IvyPanda

Legal integration progressions on cyber security in Asia, Europe, and the United States of America came into place at a very fast rate. It also led to immense development in technology within a very short time. As a result, recommendations for Federal Information Systems on security controls pointed out the importance of interrelationships, interoperability, and technical controls. These recommendations further suggested that the challenge of integration lies in global acceptance. However, later reports continued to show that there was visible progress to undertake mitigation of persistent weaknesses that were evident in most United States’ agencies. Even after training, the GAO report continued to demonstrate system control deficiencies due to failures in the identification of enough boundary security mechanisms, breakdown in the need to know, insufficient restriction of physical access, and improper identification of authentication of users to implement common security configuration policies (Roth, 2010).

We will write a custom essay on your topic a custom Article Review on “Evolution of Federal Cyber Security” by J. Roth
808 writers online

Furthermore, there have been reports on lacked proper segregation of information technology duties due to inequities in access rights. Even after recent global threats such as H1N1, more than fifty percent of the audited agencies had not entirely given an address to continuity of operations and catastrophe revitalization planning. There were also missing nationwide information security programs showing delinking of agencies in the United States alone. Identification, facilitation, and integration keys to success include observation of many existing standards which comprise global challenges in risk management professionals. Application of process improvement frameworks to ensure understanding of business drivers of the team leading information systems was also proposed (Roth, 2010).

Whereas identification of parts of a full program and larger team is relatively easy, integration of the involved components may prove to be quite difficult. Sharing sensitive information among nations whose objectives are different is a daunting task given their obvious differences in political agenda. The integration will therefore be the best way to go about the issue since the idea of postmodernism has facilitated multiplicities instead of universalities (McAuley, Duberley & Johnson, 2008). Therefore, the rift created will lead to reluctance by agencies and therefore interfere with national integration. Given that the existing standards are extremely diverse, the formation of an integrated security system will require the use of similar standards to boost the security system of any organization that may be at risk of various security threats common in business organizations. This will in turn demand deconstruction of initial standards to contain uniformity which again is highly impossible in a postmodern world (McAuley, Duberley & Johnson, 2008). Although understanding of team business drivers through process improvement will change in unit construction, a lot of positive effort is necessary at any given time.

From this article, it is imperative to note that it is possible to change some of the conventional security systems and adopt new ones in a bid to meet new security challenges facing organizations in the 21st century. It is clear that the integration and incorporation of security systems worldwide on matters of global concern is extremely important. Despite the obvious boundaries in security systems all over the world, integrations should focus on report deliveries such that organizations are not deconstructed due to the presence of a world of diverse opinions that have been shaped by postmodernism. Despite diversities in global views on different matters, there is a need for collaboration on sensitive matters that relate to global security as those that concern human health. My mental opinion has been greatly affected to consider universalities on matters of absolute global impact. In addition, my individual perception regarding global issues will not be affected by postmodernism.

References

  1. McAuley, J., Duberley, J. & Johnson, P. (2008). Organization Theory, challenges and Perspectives: Postmodernism as a philosophy: the ultimate challenge to organization theory? Phoenix: Phoenix University Press.
  2. Roth, J (2010). Evolution of Federal Cyber security.
Print
Need an custom research paper on “Evolution of Federal Cyber Security” by J. Roth written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, June 6). “Evolution of Federal Cyber Security” by J. Roth. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/

Work Cited

"“Evolution of Federal Cyber Security” by J. Roth." IvyPanda, 6 June 2022, ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

References

IvyPanda. (2022) '“Evolution of Federal Cyber Security” by J. Roth'. 6 June.

References

IvyPanda. 2022. "“Evolution of Federal Cyber Security” by J. Roth." June 6, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

1. IvyPanda. "“Evolution of Federal Cyber Security” by J. Roth." June 6, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.


Bibliography


IvyPanda. "“Evolution of Federal Cyber Security” by J. Roth." June 6, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

Powered by CiteTotal, easy referencing generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1